Keyphrases
- key management scheme
- key management
- identity based signature
- standard model
- bilinear pairings
- signcryption scheme
- identity based cryptography
- security properties
- wireless sensor networks
- signature scheme
- provably secure
- key agreement
- security model
- security protocols
- key distribution
- mobile ad hoc networks
- resource constrained
- blind signature scheme
- security requirements
- ad hoc networks
- intrusion detection
- group communication
- network security
- trusted third party
- access control
- blind signature
- diffie hellman
- secret key
- security policies
- security issues
- intrusion detection system
- secret sharing scheme