Providing key recovery capability for mobile communications

0Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we propose a novel security scheme with key recovery capability for mobile communications. The proposed key recovery mechanism offers a "backdoor" for an authorized agency to monitor suspected communications while protecting legal users from unauthorized disclosure of their data privacy. All the features form a unitary security scheme with monitoring service. The performance analysis shows that our scheme has a low-computational complexity and it can be practically deployed on contemporary mobile devices. © 2009 John Wiley & Sons, Ltd.

Cite

CITATION STYLE

APA

Chu, X., Jiang, Y., Lin, C., Yin, H., & Li, B. (2010). Providing key recovery capability for mobile communications. Security and Communication Networks, 3(2–3), 207–216. https://doi.org/10.1002/sec.156

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free