Login / Signup
A Key Management Method for Cryptographically Enforced Access Control.
Anna Zych
Milan Petkovic
Willem Jonker
Published in:
WOSIS (2007)
Keyphrases
</>
access control
key management
information loss
wireless sensor networks
resource constrained