A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load.
Hoang Nam NguyenHiroaki MorinoPublished in: EUC Workshops (2005)
Keyphrases
- key management
- symmetric key
- key management scheme
- key distribution
- security protocols
- public key cryptography
- information security
- ad hoc networks
- resource constrained
- user authentication
- high dimensional
- cellular automata
- load balancing
- authentication protocol
- security services
- low cost
- wireless sensor networks
- secure communication
- real time