On the security of Wu and Yeh's conference key distribution system.
Tzonelih HwangNarn-Yih LeeChih-Hung WangMing-Yung KoPublished in: Comput. Commun. (1995)
Keyphrases
- key distribution
- key management
- key pre distribution
- fault tolerant
- group communication
- secret key
- private key
- authentication protocol
- key management scheme
- key agreement protocol
- security protocols
- signcryption scheme
- key exchange
- ad hoc networks
- wireless sensor networks
- resource constrained
- elliptic curve
- diffie hellman
- key agreement
- smart card
- wireless ad hoc networks
- signature scheme
- access control
- secure communication
- digital signature
- security policies
- security properties
- response time
- secret sharing scheme
- high dimensional
- network security
- security requirements