Login / Signup
Key management scheme based on (t, n) threshold cryptosystem.
Xuanwu Zhou
Ping Wei
Published in:
ISKE (2008)
Keyphrases
</>
key management scheme
key management
key distribution
elliptic curve
symmetric key
wireless sensor networks
cellular automata
ad hoc networks
digital signature
public key cryptosystem
resource constrained
mobile ad hoc networks
secret key
secret sharing scheme
sensor data
private key
secure communication
multimedia