A HIPAA-compliant key management scheme with revocation of authorization.
Wei-Bin LeeChien-Ding LeeKevin I.-J. HoPublished in: Comput. Methods Programs Biomed. (2014)
Keyphrases
- key management scheme
- key management
- access control
- wireless sensor networks
- key distribution
- ad hoc networks
- resource constrained
- security policies
- security protocols
- conflict resolution
- health insurance
- elliptic curve
- access control policies
- digital signature
- mobile ad hoc networks
- secret key
- security requirements
- role based access control
- provably secure
- security mechanisms
- wireless ad hoc networks
- security model
- sensor nodes
- data sets
- sensor networks