5G Authentication and Key Management for Applications.
Xiaoting HuangVlasios TsiatsisAnand PalanigounderLi SuBo YangPublished in: IEEE Commun. Stand. Mag. (2021)
Keyphrases
- key management
- key distribution
- symmetric key
- identity based cryptography
- security services
- secure communication
- authentication scheme
- wireless sensor networks
- resource constrained
- group communication
- secret key
- encryption decryption
- ad hoc networks
- security protocols
- secret sharing scheme
- authentication protocol
- security mechanisms
- digital signature
- elliptic curve
- key management scheme
- provably secure
- signcryption scheme
- key establishment
- diffie hellman
- public key cryptography
- private key
- real time
- resource constraints
- similarity search
- lightweight
- web services