Optimizing the tree structure in secure multicast key management.
Wen Tao ZhuPublished in: IEEE Commun. Lett. (2005)
Keyphrases
- tree structure
- key management
- key management scheme
- ad hoc networks
- wireless sensor networks
- wireless ad hoc networks
- digital signature
- resource constrained
- group communication
- key distribution
- tree structures
- routing algorithm
- data structure
- provably secure
- identity based cryptography
- security services
- security protocols
- secret sharing scheme
- secure communication
- frequent patterns
- wireless networks
- index structure
- secret key
- xml documents
- elliptic curve
- mobile ad hoc networks
- key establishment
- diffie hellman
- network topology
- sensor networks
- quality of service
- data sets