Login / Signup
Construction and evaluation of the identity transformers for cryptographic key distribution.
Tsutomu Matsumoto
Youichi Takashima
Hideki Iraai
Published in:
Systems and Computers in Japan (1991)
Keyphrases
</>
key distribution
key management
security protocols
smart card
secret key
secure communication
ad hoc networks
digital signature
wireless sensor networks
resource constrained
authentication protocol