Secure and reliable certificate chains recovery protocol for mobile ad hoc networks.
Mawloud OmarHamida BoufaghesLydia MammeriAmel TaalbaAbdelkamel TariPublished in: J. Netw. Comput. Appl. (2016)
Keyphrases
- cryptographic protocols
- covert channel
- authentication mechanism
- authentication protocol
- secure routing
- key distribution
- public key encryption
- routing protocol
- group communication
- security protocols
- key exchange protocol
- scalar product
- mutual authentication
- security analysis
- secure multiparty computation
- vertically partitioned data
- key agreement protocol
- privacy preserving
- lightweight
- password authentication
- homomorphic encryption
- cryptographic algorithms
- public key infrastructure
- diffie hellman
- rfid systems
- factor authentication
- key exchange
- trusted third party
- message delivery
- key establishment
- multi party
- key management
- provably secure
- electronic voting
- security model
- secure multi party
- data encryption
- security requirements
- ad hoc networks
- smart card
- public key
- blind signature
- failure recovery
- mobile payment
- secure communication
- rfid tags
- security issues
- authentication scheme