Key management for non-tree access hierarchies.
Mikhail J. AtallahMarina BlantonKeith B. FrikkenPublished in: SACMAT (2006)
Keyphrases
- key management
- key management scheme
- resource constrained
- ad hoc networks
- wireless sensor networks
- hierarchical structure
- secret sharing scheme
- security threats
- identity based cryptography
- key distribution
- digital signature
- security protocols
- access control
- group communication
- secret key
- provably secure
- secure communication
- network topology
- security services
- low cost
- data sets