A Chain Based Signature Scheme for Uplink and Downlink Communications in AMI Networks.
Samer KhasawnehMichel KadochPublished in: SGIoT (2018)
Keyphrases
- signature scheme
- application layer
- scheduling and resource allocation
- standard model
- long term evolution
- ambient intelligence
- digital signature scheme
- multimedia services
- threshold signature scheme
- public key
- blind signature
- blind signature scheme
- cellular networks
- designated verifier
- traffic load
- resource allocation
- public key cryptosystem
- diffie hellman
- secret key
- communication systems
- provably secure
- code division multiple access
- fourth generation
- computer networks
- wireless channels
- video streaming
- network structure
- digital signature
- mobile devices