Login / Signup
ZigBee Security Using Identity-Based Cryptography.
Son Thanh Nguyen
Chunming Rong
Published in:
ATC (2007)
Keyphrases
</>
identity based cryptography
key management
resource constrained
wireless sensor networks
digital signature
wireless communication
bilinear pairings
low cost
ad hoc networks
secret sharing scheme
signcryption scheme
elliptic curve
public key
wireless sensor
blind signature scheme
blind signature
access control