Login / Signup
On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols.
Konstantinos Chalkias
F. Mpaldimtsi
Dimitris Hristu-Varsakelis
George Stephanides
Published in:
SECRYPT (2007)
Keyphrases
</>
key establishment
sensor networks
wireless sensor networks
secret key
pairwise
key management
smart card
authentication protocol
security protocols
symmetric key
similarity measure
end to end
private key
secure communication