Secure Mobile Subscription of Sensor-encrypted Data
In an end-to-end encryption model for a wireless sensor network (WSN), the network control center preloads encryption and decryption keys to the sensor nodes and the subscribers respectively, such that a subscriber can use a mobile device in the deployment field to decrypt the sensed data encrypted...
Saved in:
Main Authors: | CHU, Cheng-Kang, ZHU, Wen-Tao, CHOW, Sherman S. M., ZHOU, Jianying, DENG, Robert H. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2011
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1423 https://ink.library.smu.edu.sg/context/sis_research/article/2422/viewcontent/Secure_Mobile_Sub_2011_afv.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption
by: LAI, Junzuo, et al.
Published: (2014) -
Expressive Search on Encrypted Data
by: LAI, Junzuo, et al.
Published: (2013) -
Authorized Keyword Search on Encrypted Data
by: SHI, Jie, et al.
Published: (2014) -
Strongly leakage resilient authenticated key exchange, revisited
by: YANG, Guomin, et al.
Published: (2019) -
RSA-based certificateless public key encryption
by: LAI, Junzuo, et al.
Published: (2009)