Limitations of IEC62351-3's public key management.
James G. WrightStephen D. WolthusenPublished in: ICNP (2016)
Keyphrases
- key management
- ad hoc networks
- resource constrained
- wireless sensor networks
- key management scheme
- secret sharing scheme
- secret key
- key distribution
- control system
- provably secure
- identity based cryptography
- group communication
- security threats
- digital signature
- security protocols
- security services
- distributed systems
- smart grid
- communication networks
- secure communication
- elliptic curve
- peer to peer
- real time