Login / Signup
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms.
Bruce Christianson
Bruno Crispo
James A. Malcolm
Published in:
Security Protocols Workshop (2000)
Keyphrases
</>
public key
digital signature
private key
symmetric key
security protocols
security analysis
public key cryptography
secure communication
encryption scheme
key management
real time
wireless sensor networks
signature scheme
resource constrained
authentication protocol