Weaknesses in EHA Authentication and Key Distribution Protocol.
Martin StanekDaniel OlejárPublished in: Communications and Multimedia Security (1999)
Keyphrases
- key distribution
- authentication protocol
- key management
- group communication
- fault tolerant
- secret key
- private key
- signature scheme
- elliptic curve
- distributed systems
- symmetric key
- key agreement protocol
- key exchange
- security protocols
- smart card
- security analysis
- wireless ad hoc networks
- digital signature
- ad hoc networks
- lightweight
- wireless sensor networks
- resource constrained
- resource constraints
- secret sharing scheme
- security policies
- end to end
- key management scheme
- key agreement
- key establishment