Login / Signup
Polynomial-based key management for secure intra-group and inter-group communication.
Piao Yanji
Jonguk Kim
Usman Tariq
Manpyo Hong
Published in:
Comput. Math. Appl. (2013)
Keyphrases
</>
key management
group communication
key distribution
wireless sensor networks
ad hoc networks
key management scheme
resource constrained
diffie hellman
identity based cryptography
provably secure
digital signature
secure communication
security services
elliptic curve
security protocols
fault tolerance
secret key
fault tolerant
multipath
routing algorithm
end to end
key establishment
network structure