Privacy enhancement for Internet electronic mail: Part II - certificate-based key management.
Stephen T. KentJohn LinnPublished in: RFC (1989)
Keyphrases
- electronic mail
- key management
- security services
- wireless sensor networks
- ad hoc networks
- bulletin board
- resource constrained
- security threats
- key management scheme
- email messages
- security protocols
- secret sharing scheme
- personal information
- digital signature
- secret key
- identity based cryptography
- security mechanisms
- privacy preserving
- key distribution
- elliptic curve
- provably secure
- secure communication
- security issues
- routing protocol
- data collection
- key establishment
- low cost