Login / Signup
The threat of forcing the identical roles for authenticated key establishment protocols.
Evgeniy K. Alekseev
Sergey Kyazhin
Stanislav Smyshlyaev
Published in:
J. Comput. Virol. Hacking Tech. (2024)
Keyphrases
</>
key establishment
wireless sensor networks
sensor networks
key management
key distribution
pairwise
secret key
key establishment protocol
key agreement protocol
sensor nodes
key exchange
low cost
lightweight
sensor data
resource constrained
group communication