Login / Signup
Efficient key management for cryptographically enforced access control.
Anna Zych
Milan Petkovic
Willem Jonker
Published in:
Comput. Stand. Interfaces (2008)
Keyphrases
</>
access control
key management
security policies
data security
role based access control
dynamic access control
resource constrained
security mechanisms
access control policies
wireless sensor networks
security requirements
security model
key management scheme
access control models
lightweight
diffie hellman