Sign in
Some simple optimization techniques for self-organized public key management in mobile ad hoc networks.
T. Bornand-Jaccard
David Schindl
Dominique de Werra
Published in:
Discret. Appl. Math. (2006)
Keyphrases
</>
key management
wireless sensor networks
key management scheme
digital signature
resource constrained
security threats
real time
routing protocol
ad hoc networks
security services