Incorporating Temporal Capabilities in Existing Key Management Schemes.
Mikhail J. AtallahMarina BlantonKeith B. FrikkenPublished in: ESORICS (2007)
Keyphrases
- key management
- key management scheme
- provably secure
- wireless sensor networks
- ad hoc networks
- bilinear pairings
- resource constrained
- secret sharing scheme
- identity based cryptography
- key distribution
- security threats
- temporal information
- secure communication
- group communication
- secret key
- digital signature
- security protocols
- elliptic curve
- security services
- mobile ad hoc networks
- temporal constraints
- sensor networks
- temporal reasoning
- real time