Key management in tree shaped hierarchies.
Lanfranco LopriorePublished in: Inf. Secur. J. A Glob. Perspect. (2018)
Keyphrases
- key management
- tree shaped
- ad hoc networks
- wireless sensor networks
- resource constrained
- security threats
- key distribution
- key management scheme
- secret sharing scheme
- digital signature
- identity based cryptography
- group communication
- wireless ad hoc networks
- security protocols
- provably secure
- secret key
- network topology
- security services
- resource constraints
- end to end
- response time
- key establishment
- data sets