Separating key management from file system security.
David MazièresMichael KaminskyM. Frans KaashoekEmmett WitchelPublished in: SOSP (1999)
Keyphrases
- key management
- file system
- security threats
- wireless sensor networks
- identity based cryptography
- resource constrained
- key distribution
- key management scheme
- ad hoc networks
- security protocols
- security services
- provably secure
- secure communication
- elliptic curve
- digital signature
- key establishment
- secret key
- storage devices
- blind signature scheme
- peer to peer