Secure Key Management Policies in Strand Spaces.
Riccardo FocardiFlaminia L. LuccioPublished in: Protocols, Strands, and Logic (2021)
Keyphrases
- key management
- key management scheme
- key distribution
- resource constrained
- wireless sensor networks
- ad hoc networks
- digital signature
- provably secure
- secret sharing scheme
- security threats
- security protocols
- secure communication
- group communication
- security services
- identity based cryptography
- key establishment
- diffie hellman
- secret key
- elliptic curve
- authentication scheme
- real time
- security mechanisms