Keyphrases
- end to end
- key management
- ad hoc networks
- wireless ad hoc networks
- key management scheme
- network topology
- resource constrained
- key distribution
- secret sharing scheme
- wireless sensor networks
- digital signature
- security threats
- group communication
- security services
- secure communication
- security protocols
- provably secure
- wireless networks
- pairwise
- query processing
- secret key
- communication networks
- real time