A key-management-based taxonomy for ransomware.
Richard J. EnbodyAditya K. SoodPranshu BajpaiPublished in: eCrime (2018)
Keyphrases
- key management
- ad hoc networks
- wireless sensor networks
- resource constrained
- key management scheme
- secret sharing scheme
- digital signature
- key distribution
- secure communication
- identity based cryptography
- elliptic curve
- group communication
- security threats
- security protocols
- end to end
- wireless ad hoc networks
- secret key
- provably secure
- security services
- key establishment
- secret sharing
- quality of service
- wireless networks
- response time