Automatic Analysis of the Security of XOR-Based Key Management Schemes.
Véronique CortierGavin KeighrenGraham SteelPublished in: TACAS (2007)
Keyphrases
- automatic analysis
- key management
- key management scheme
- provably secure
- wireless sensor networks
- ad hoc networks
- security threats
- key pre distribution
- resource constrained
- identity based cryptography
- key distribution
- bilinear pairings
- security services
- digital signature
- secret sharing scheme
- elliptic curve
- secure communication
- security protocols
- group communication
- secret key
- mobile ad hoc networks
- public key cryptography
- key establishment
- sensor networks
- diffie hellman
- routing protocol
- authentication scheme
- real time