An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem.
Fuh-Gwo JengChung-Ming WangPublished in: J. Syst. Softw. (2006)
Keyphrases
- elliptic curve
- access control
- key management
- key management scheme
- scalar multiplication
- ad hoc networks
- key distribution
- wireless sensor networks
- resource constrained
- digital signature
- data security
- security policies
- diffie hellman
- role based access control
- public key cryptography
- security mechanisms
- secret sharing scheme
- security model
- access control policies
- security requirements
- security protocols
- secret key
- secure communication
- resource constraints
- power analysis
- low cost
- peer to peer
- routing protocol
- end to end