Keyphrases
- group communication
- key management
- fault tolerance
- key distribution
- database replication
- fault tolerant
- wireless mesh networks
- computing environments
- information security
- network security
- intrusion detection
- message delivery
- security protocols
- resource constrained
- security requirements
- ad hoc networks
- sensor networks
- wireless sensor networks
- real time