Login / Signup
A chaos-based authentication and key management scheme for M2M communication.
Wided Boubakri
Walid Abdallah
Noureddine Boudriga
Published in:
ICITST (2014)
Keyphrases
</>
key management scheme
key management
resource constrained
secure communication
key distribution
security mechanisms
wireless sensor networks
communication networks
ad hoc networks
secret key
load balancing
authentication scheme
image encryption