A secure and timestamp-based communication scheme for cloud environment.
Abu SalimSachin TripathiRajesh Kumar TiwariPublished in: Int. J. Electron. Secur. Digit. Forensics (2014)
Keyphrases
- secure communication
- authentication scheme
- digital signature scheme
- security analysis
- public key encryption
- authentication protocol
- communication overhead
- key distribution
- secret sharing
- multi party
- group communication
- key exchange
- key management
- public key
- communication systems
- provably secure
- protection scheme
- authentication mechanism
- encryption key
- key establishment
- communication cost
- ad hoc networks