Multilayer multicast key management with threshold cryptography.
Scott D. DexterRoman BelostotskiyAhmet M. EskiciogluPublished in: Security, Steganography, and Watermarking of Multimedia Contents (2004)
Keyphrases
- key management
- key management scheme
- symmetric key
- wireless ad hoc networks
- ad hoc networks
- wireless sensor networks
- signcryption scheme
- resource constrained
- group communication
- key distribution
- secret sharing scheme
- security services
- provably secure
- routing algorithm
- wireless networks
- elliptic curve
- security protocols
- digital signature
- secret key
- end to end
- identity based cryptography
- public key cryptography
- key establishment
- mobile ad hoc networks
- response time
- sensor networks
- real time
- fault tolerant
- lightweight