Login / Signup
Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols.
Konstantinos Chalkias
Foteini Baldimtsi
Dimitris Hristu-Varsakelis
George Stephanides
Published in:
ICETE (Selected Papers) (2007)
Keyphrases
</>
key establishment
wireless sensor networks
sensor networks
security protocols
pairwise
secret key
symmetric key
authentication protocol
key management
smart card
security analysis
secure communication
information systems
cryptographic protocols
security mechanisms
pseudorandom