A Secure Key Management Interface with Asymmetric Cryptography.
Marion DaubignardDavid LubiczGraham SteelPublished in: POST (2014)
Keyphrases
- key management
- symmetric key
- key management scheme
- ad hoc networks
- key distribution
- wireless sensor networks
- resource constrained
- digital signature
- group communication
- key establishment
- security services
- security protocols
- secret sharing scheme
- provably secure
- security threats
- identity based cryptography
- secret key
- secure communication
- diffie hellman
- information security
- secret sharing
- public key cryptography
- energy consumption