Re-examining Probabilistic Versus Deterministic Key Management.
Dahai XuJianwei HuangJeffrey S. DwoskinMung ChiangRuby B. LeePublished in: ISIT (2007)
Keyphrases
- key management
- ad hoc networks
- resource constrained
- wireless sensor networks
- key management scheme
- group communication
- key distribution
- security threats
- secure communication
- security protocols
- identity based cryptography
- elliptic curve
- provably secure
- digital signature
- secret sharing scheme
- security services
- wireless ad hoc networks
- secret key
- bilinear pairings
- key establishment
- lightweight