Login / Signup
Evaluating Key Management Strategies for Applied Cryptography Protocols.
Jaganathan Logeshwaran
Manoj Kumar Mahto
G. L. Saini
Deepak Panwar
Published in:
ICIMMI (2023)
Keyphrases
</>
key management
key distribution
security protocols
security services
symmetric key
resource constrained
wireless sensor networks
ad hoc networks
wireless ad hoc networks
digital signature
secret sharing scheme