Login / Signup
A Key Management Scheme for Establishing an Encryption-Based Trusted IoT System.
Quazi Mamun
Muhammad Rana
Published in:
CHASE (2019)
Keyphrases
</>
key management
key management scheme
ad hoc networks
resource constrained
key distribution
wireless sensor networks
digital signature
secret key
elliptic curve
wireless ad hoc networks
distributed environment
security protocols
secure communication
routing protocol
routing algorithm
diffie hellman
high dimensional