Guidelines for Cryptographic Key Management.
Steven M. BellovinRussell HousleyPublished in: RFC (2005)
Keyphrases
- key management
- ad hoc networks
- resource constrained
- wireless sensor networks
- digital signature
- security protocols
- key distribution
- key management scheme
- secure communication
- secret sharing scheme
- secret key
- provably secure
- identity based cryptography
- elliptic curve
- security services
- multipath
- end to end
- real time
- sensor networks