Ad Hoc Key Management Infrastructure.
Brian LehaneLinda DoyleDonal O'MahonyPublished in: ITCC (2) (2005)
Keyphrases
- key management
- security services
- ad hoc networks
- wireless sensor networks
- resource constrained
- key distribution
- digital signature
- security threats
- key management scheme
- secret key
- secret sharing scheme
- security protocols
- secure communication
- group communication
- identity based cryptography
- provably secure
- elliptic curve
- diffie hellman