Login / Signup
Extended KCI attack against two-party key establishment protocols.
Qiang Tang
Liqun Chen
Published in:
Inf. Process. Lett. (2011)
Keyphrases
</>
key establishment
secret key
wireless sensor networks
sensor networks
pairwise
key management
smart card
key establishment protocol
authentication protocol
key distribution
secure communication
public key
pseudorandom
key agreement protocol
diffie hellman
symmetric key
resource constrained
sensor nodes
lightweight