Secured Cloud Storage Scheme Using ECC Based Key Management in User Hierarchy.
Atanu BasuIndranil SenguptaJamuna Kanta SingPublished in: ICISS (2011)
Keyphrases
- key management
- elliptic curve
- key management scheme
- key distribution
- identity based cryptography
- secure communication
- cloud storage
- provably secure
- ad hoc networks
- wireless sensor networks
- resource constrained
- authentication scheme
- digital signature
- end users
- security protocols
- key establishment
- error correction
- secret key
- public key cryptography
- access control
- mobile devices