Hardware-rooted trust for secure key management and transient trust.
Jeffrey S. DwoskinRuby B. LeePublished in: CCS (2007)
Keyphrases
- key management
- security services
- trusted computing
- key management scheme
- ad hoc networks
- key distribution
- wireless sensor networks
- resource constrained
- digital signature
- identity based cryptography
- security protocols
- secret sharing scheme
- security threats
- group communication
- secure communication
- security mechanisms
- personal information
- real time
- authentication scheme
- embedded systems
- smart card
- provably secure
- public key cryptography
- end to end
- key establishment