Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds.
Piotr K. TysowskiM. Anwarul HasanPublished in: IEEE Trans. Cloud Comput. (2013)
Keyphrases
- key management
- mobile applications
- wireless sensor networks
- key management scheme
- key distribution
- ad hoc networks
- digital signature
- resource constrained
- mobile devices
- group communication
- secret key
- symmetric key
- mobile users
- mobile phone
- security services
- user experience
- security protocols
- elliptic curve
- end users
- secret sharing scheme
- context aware
- secure communication
- diffie hellman
- provably secure
- key establishment
- identity based cryptography
- encryption decryption
- smart card
- cloud computing
- low cost
- routing protocol
- authentication scheme
- quality of service
- lightweight