Security for Key Management Interfaces.
Steve KremerGraham SteelBogdan WarinschiPublished in: CSF (2011)
Keyphrases
- key management
- security threats
- ad hoc networks
- wireless sensor networks
- key management scheme
- identity based cryptography
- security services
- resource constrained
- security protocols
- key distribution
- secret sharing scheme
- key pre distribution
- elliptic curve
- provably secure
- secure communication
- digital signature
- group communication
- routing protocol
- signcryption scheme
- key establishment
- security mechanisms
- secret key
- private key
- resource constraints
- end to end
- encryption decryption
- quality of service
- sensor networks