Secure Key Management Based Mobile Authentication in Cloud.
S. Shanmuga PriyaD. YuvarajT. Satyanarayana MurthyVarghese S. ChooralilS. Navaneetha KrishnanP. BanumathyP. Sundara VadivelPublished in: Comput. Syst. Sci. Eng. (2022)
Keyphrases
- key management
- key distribution
- symmetric key
- security services
- secure communication
- identity based cryptography
- authentication scheme
- ad hoc networks
- wireless sensor networks
- key management scheme
- digital signature
- group communication
- resource constrained
- encryption decryption
- mobile networks
- provably secure
- secret key
- cloud computing
- security protocols
- secret sharing scheme
- key establishment
- factor authentication
- public key cryptography
- mobile devices
- trusted third party
- private key
- authentication protocol
- computing environments
- signcryption scheme
- end to end
- mobile users
- wireless networks
- user authentication
- security mechanisms