Key Management for Secure Multicast Using the RingNet Hierarchy.
Guojun WangLin LiaoJiannong CaoKeith C. C. ChanPublished in: CIS (2004)
Keyphrases
- key management
- key management scheme
- wireless ad hoc networks
- wireless sensor networks
- ad hoc networks
- key distribution
- resource constrained
- group communication
- secret sharing scheme
- security protocols
- provably secure
- routing algorithm
- security threats
- security services
- wireless networks
- key establishment
- identity based cryptography
- elliptic curve
- secret key
- mobile ad hoc networks
- end to end
- digital signature
- diffie hellman
- bilinear pairings
- routing protocol
- authentication scheme
- network topology
- sensor networks