Identity-Based Threshold Key Management for Ad Hoc Networks.
Yuchen ZhangJing LiuYadi WangJihong HanHengjun WangKun WangPublished in: PACIIA (2) (2008)
Keyphrases
- key management
- ad hoc networks
- signcryption scheme
- network topology
- key distribution
- wireless ad hoc networks
- routing protocol
- end to end
- wireless networks
- routing algorithm
- multi hop
- identity based cryptography
- security services
- group communication
- bilinear pairings
- key management scheme
- provably secure
- group key agreement
- peer to peer
- quality of service
- secret sharing scheme
- base station
- elliptic curve
- digital signature
- mobile ad hoc networks
- mobile networks
- secure communication
- security protocols
- symmetric key
- wireless sensor networks
- wireless mesh networks
- resource constrained
- digital libraries
- data sets
- real time