Sign in

Some simple optimization techniques for self-organized public key management in mobile ad hoc networks.

T. Bornand-JaccardDavid SchindlDominique de Werra
Published in: Discret. Appl. Math. (2006)
Keyphrases
  • key management
  • wireless sensor networks
  • key management scheme
  • digital signature
  • resource constrained
  • security threats
  • real time
  • routing protocol
  • ad hoc networks
  • security services