Incorporating Temporal Capabilities in Existing Key Management Schemes.
Mikhail J. AtallahMarina BlantonKeith B. FrikkenPublished in: IACR Cryptol. ePrint Arch. (2007)
Keyphrases
- key management
- key management scheme
- provably secure
- wireless sensor networks
- resource constrained
- ad hoc networks
- bilinear pairings
- key distribution
- digital signature
- security threats
- temporal information
- secret sharing scheme
- group communication
- security protocols
- temporal constraints
- security services
- secure communication
- identity based cryptography
- elliptic curve
- diffie hellman
- secret key
- mobile ad hoc networks
- temporal reasoning
- data sets
- fault tolerant
- sensor networks