Login / Signup

Evaluating Key Management Strategies for Applied Cryptography Protocols.

Jaganathan LogeshwaranManoj Kumar MahtoG. L. SainiDeepak Panwar
Published in: ICIMMI (2023)
Keyphrases
  • key management
  • key distribution
  • security protocols
  • security services
  • symmetric key
  • resource constrained
  • wireless sensor networks
  • ad hoc networks
  • wireless ad hoc networks
  • digital signature
  • secret sharing scheme