An efficient scheme to handle bursty behavior in secure group communication using binomial key trees.
R. AparnaB. B. AmberkerPublished in: Secur. Commun. Networks (2011)
Keyphrases
- group communication
- key distribution
- private key
- key management
- secure communication
- fault tolerance
- wireless mesh networks
- fault tolerant
- secret key
- replicated databases
- authentication protocol
- computing environments
- security protocols
- elliptic curve
- message delivery
- distributed systems
- response time
- sensor networks
- public key
- multi channel
- intelligent agents
- key establishment
- digital libraries