Keyphrases
- key management
- ad hoc networks
- wireless sensor networks
- key management scheme
- resource constrained
- security threats
- key distribution
- secret sharing scheme
- digital signature
- provably secure
- group communication
- identity based cryptography
- secret key
- wireless ad hoc networks
- elliptic curve
- security protocols
- secure communication
- information security
- key establishment
- power consumption