Using the XML Key Management Specification (and Breaking X.509 Rules as You Go).
Stephen FarrellJosé KahanPublished in: Communications and Multimedia Security (2005)
Keyphrases
- key management
- wireless sensor networks
- ad hoc networks
- xml documents
- resource constrained
- key management scheme
- secret sharing scheme
- key distribution
- uml diagrams
- digital signature
- security threats
- xml data
- xml schema
- identity based cryptography
- databases
- security protocols
- elliptic curve
- data integration
- relational databases
- metadata
- provably secure
- key establishment
- real time
- secret key
- network topology
- quality of service
- digital libraries
- group communication
- security services
- diffie hellman