Attacking Group Multicast Key Management Protocols Using Coral.
Graham SteelAlan BundyPublished in: Electron. Notes Theor. Comput. Sci. (2005)
Keyphrases
- key management
- key management scheme
- key distribution
- security protocols
- ad hoc networks
- wireless ad hoc networks
- group communication
- group membership
- key establishment
- security services
- wireless sensor networks
- resource constrained
- routing algorithm
- wireless networks
- ip multicast
- identity based cryptography
- end to end
- digital signature
- elliptic curve
- mobile ad hoc networks
- provably secure
- secret key
- secure communication
- routing protocol
- smart card
- diffie hellman
- network topology
- information security
- multicast routing
- fault tolerant
- security properties
- multimedia
- real time