Logging, security experts data base, and crypto key management.
Charles C. WoodPublished in: ACM Annual Conference (1984)
Keyphrases
- key management
- security protocols
- digital signature
- resource constrained
- security threats
- wireless sensor networks
- key distribution
- security services
- ad hoc networks
- key management scheme
- identity based cryptography
- database
- key pre distribution
- secure communication
- security properties
- private key
- secret sharing scheme
- secret key
- provably secure
- group communication
- key establishment
- authentication protocol
- sensor networks
- elliptic curve
- diffie hellman
- blind signature
- rfid tags
- intrusion detection
- signcryption scheme
- encryption decryption