Login / Signup
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography.
Gildas Avoine
Sébastien Canard
Loïc Ferreira
Published in:
ESORICS (2) (2019)
Keyphrases
</>
symmetric key
key management
key distribution
wireless sensor networks
ad hoc networks
resource constrained
security protocols
secret key
secret sharing scheme
digital signature
provably secure
group communication
security services
secure communication
elliptic curve
secret sharing
quality of service