On the Development of a Protection Profile Module for Encryption Key Management Components.
Nan SunChang-Tsun LiHin ChanMd Zahidul IslamMd. Rafiqul IslamWarren ArmstrongPublished in: IEEE Access (2023)
Keyphrases
- key management
- ad hoc networks
- wireless sensor networks
- digital signature
- resource constrained
- key management scheme
- key distribution
- secret sharing scheme
- security protocols
- secret key
- secure communication
- elliptic curve
- software engineering
- provably secure
- key establishment
- data streams
- wireless networks
- sensor networks