Keyphrases
- key distribution
- key management
- continuous variables
- fault tolerant
- authentication protocol
- private key
- group communication
- dynamic systems
- signcryption scheme
- secret key
- ad hoc networks
- structure learning
- signature scheme
- diffie hellman
- security protocols
- wireless ad hoc networks
- resource constrained
- security requirements
- elliptic curve
- computationally expensive
- sample size
- bayesian networks
- information security
- routing protocol
- wireless sensor networks