|
Volumn , Issue , 2008, Pages 223-230
|
Hierarchical identity based cryptography for end-to-end security in DTNs
|
Author keywords
[No Author keywords available]
|
Indexed keywords
AUTHENTICATION SERVICES;
DELAY TOLERANT NETWORKS;
END-TO-END COMMUNICATION;
END-TO-END CONNECTIVITY;
END-TO-END SECURITY;
ERROR RATE;
FINE-GRAINED REVOCATION;
HIERARCHICAL IDENTITY-BASED ENCRYPTIONS;
IDENTITY BASED CRYPTOGRAPHY;
KEY MANAGEMENT;
LOW LATENCY;
PUBLIC KEYS;
SECURITY ARCHITECTURE;
SECURITY MECHANISM;
ACCESS CONTROL;
CRYPTOGRAPHY;
NETWORK SECURITY;
|
EID: 67650233907
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ICCP.2008.4648376 Document Type: Conference Paper |
Times cited : (24)
|
References (23)
|