Cloud Key Management using Trusted Execution Environment.
Jaouhara BouamamaMustapha HedabouMohammed ErradiPublished in: SECRYPT (2021)
Keyphrases
- key management
- execution environment
- wireless sensor networks
- ad hoc networks
- cloud computing
- resource constrained
- identity based cryptography
- key management scheme
- key distribution
- life cycle
- security protocols
- distributed environment
- secret key
- key establishment
- wireless networks
- sensor networks
- web services
- end to end
- routing algorithm
- energy consumption
- data streams