Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services.
Daniela VenturaAitor Gómez-GoiriVincenzo CataniaDiego López-de-IpiñaJ. A. M. NaranjoLeocadio G. CasadoPublished in: Log. J. IGPL (2016)
Keyphrases
- security analysis
- resource requirements
- network services
- user access
- authentication protocol
- mobile networks
- public key
- smart card
- application level
- resource allocation
- security requirements
- mobile devices
- encryption scheme
- wireless networks
- computer systems
- low cost
- mobile technologies
- information systems
- energy consumption