Public key management for network security.
David B. Newman Jr.Jim K. OmuraRaymond L. PickholtzPublished in: IEEE Netw. (1987)
Keyphrases
- network security
- key management
- secure communication
- computer networks
- intrusion detection
- resource constrained
- ad hoc networks
- wireless sensor networks
- intrusion detection system
- key management scheme
- security policies
- digital signature
- security threats
- traffic analysis
- network traffic
- information security
- key distribution
- secret sharing scheme
- anomaly detection
- wireless ad hoc networks
- security protocols
- elliptic curve
- secret key
- routing protocol
- wireless networks
- network management
- resource constraints
- smart card