Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach.
Stefan G. WeberPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- end to end
- secure communication
- ad hoc networks
- computing environments
- smart card
- secret key
- key management
- wireless ad hoc networks
- digital signature
- public key
- secret sharing
- mobile devices
- routing algorithm
- congestion control
- network security
- security protocols
- multi hop
- chaotic systems
- wireless communication
- load balancing
- mobile agents