Internet Security Association and Key Management Protocol (ISAKMP).
Douglas MaughanMark SchertlerMark SchneiderJeff TurnerPublished in: RFC (1998)
Keyphrases
- key management
- key distribution
- security protocols
- provably secure
- group communication
- key establishment
- resource constrained
- key pre distribution
- symmetric key
- security services
- key management scheme
- wireless sensor networks
- security mechanisms
- elliptic curve
- security threats
- secure communication
- diffie hellman
- ad hoc networks
- identity based cryptography
- secret sharing scheme
- digital signature
- security properties
- secret key
- cryptographic protocols
- blind signature
- authentication protocol
- private key
- signcryption scheme
- blind signature scheme
- resource constraints
- bilinear pairings
- low cost
- public key cryptography
- routing problem
- multipath
- response time