An Approach to XML Key Management Specification in X-Certificator.
Joan LuNathan CrippsChe HuaCao YanPublished in: International Conference on Internet Computing (2005)
Keyphrases
- key management
- wireless sensor networks
- xml documents
- ad hoc networks
- resource constrained
- key management scheme
- identity based cryptography
- key distribution
- secret sharing scheme
- security threats
- digital signature
- relational databases
- group communication
- security protocols
- metadata
- secure communication
- provably secure
- secret key
- elliptic curve
- data model
- data sets
- data integration
- key establishment
- databases
- distributed systems
- end to end
- wireless networks