Uma Avaliação do Esquema de Gerenciamento de Chave Baseado em Identidade Identity Key Management.
Eduardo da SilvaLuiz Carlos Pessoa AlbiniMurilo W. S. LimaPublished in: RITA (2013)
Keyphrases
- key management
- ad hoc networks
- expectation maximization
- security threats
- wireless sensor networks
- resource constrained
- key management scheme
- key distribution
- secret key
- secret sharing scheme
- security services
- group communication
- elliptic curve
- identity based cryptography
- security protocols
- provably secure
- digital signature
- secure communication
- multimedia
- resource constraints
- diffie hellman
- signcryption scheme
- mobile networks
- similarity measure