Login / Signup
Spoilt for choice: graph-based assessment of key management protocols to share encrypted data.
Holger Kühner
Hannes Hartenstein
Published in:
CODASPY (2014)
Keyphrases
</>
key management
key distribution
security protocols
key establishment
wireless sensor networks
resource constrained
ad hoc networks
key management scheme
secret key
encryption scheme
third party
authentication protocol
encrypted data
low cost
rfid tags
read write