An efficient identity-based cryptosystem for end-to-end mobile security.
Jing-Shyang HwuRong-Jaye ChenYi-Bing LinPublished in: IEEE Trans. Wirel. Commun. (2006)
Keyphrases
- end to end
- key management
- public key cryptosystem
- key distribution
- ad hoc networks
- signature scheme
- elliptic curve
- signcryption scheme
- private key
- mobile networks
- encryption scheme
- wireless ad hoc networks
- mobile devices
- identity based cryptography
- ciphertext
- digital signature
- public key
- cca secure
- admission control
- security issues
- high bandwidth
- information security
- congestion control
- diffie hellman
- standard model
- application layer
- security protocols
- mobile nodes
- security analysis
- encryption algorithm
- security requirements
- provably secure
- multipath
- network security
- intrusion detection
- access control
- resource constrained
- physical layer
- transport layer