TPM Enterprise Key Management requires centralized Hardware-based Security.
Bernhard WeissPublished in: ISSE (2006)
Keyphrases
- key management
- security threats
- wireless sensor networks
- ad hoc networks
- resource constrained
- identity based cryptography
- key management scheme
- security protocols
- security services
- key distribution
- group communication
- trusted computing
- secure communication
- low cost
- real time
- provably secure
- elliptic curve
- trusted platform module
- key establishment
- secret sharing scheme
- digital signature
- computing platform
- distributed environment
- peer to peer
- secret key
- embedded systems
- wireless networks
- computing environments
- diffie hellman
- resource constraints
- routing algorithm