Optimizing deletion cost for secure multicast key management.
Zhi-Zhong ChenZe FengMinming LiF. Frances YaoPublished in: Theor. Comput. Sci. (2008)
Keyphrases
- key management
- key management scheme
- ad hoc networks
- wireless sensor networks
- wireless ad hoc networks
- key distribution
- group communication
- resource constrained
- digital signature
- secure communication
- routing algorithm
- secret key
- secret sharing scheme
- wireless networks
- security threats
- security protocols
- mobile ad hoc networks
- identity based cryptography
- security services
- diffie hellman
- provably secure
- end to end
- key establishment
- routing protocol
- peer to peer