Probabilistic optimization techniques for multicast key management.
Ali Aydin SelçukDeepinder P. SidhuPublished in: Comput. Networks (2002)
Keyphrases
- key management
- key management scheme
- wireless ad hoc networks
- ad hoc networks
- wireless sensor networks
- routing algorithm
- group communication
- resource constrained
- key distribution
- wireless networks
- security threats
- secret sharing scheme
- provably secure
- elliptic curve
- identity based cryptography
- security protocols
- secure communication
- digital signature
- diffie hellman
- end to end
- secret key
- mobile ad hoc networks
- sensor networks
- key establishment
- digital libraries
- query processing