Key management in a non-trusted distributed environment.
Ed DawsonAndrew J. ClarkMark LooiPublished in: Future Gener. Comput. Syst. (2000)
Keyphrases
- distributed environment
- key management
- ad hoc networks
- wireless sensor networks
- resource constrained
- key distribution
- key management scheme
- distributed systems
- distributed databases
- intelligent agents
- distributed computing
- peer to peer
- group communication
- distributed data mining
- peer to peer networks
- secret key
- elliptic curve
- digital signature
- secure communication
- security protocols
- key establishment
- identity based cryptography
- resource constraints
- wireless networks
- cooperative
- real time