Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX.
Pau-Chen ChengJuan A. GarayAmir HerzbergHugo KrawczykPublished in: USENIX Security Symposium (1995)
Keyphrases
- key management
- key distribution
- security protocols
- provably secure
- group communication
- key management scheme
- security services
- secure communication
- diffie hellman
- digital signature
- elliptic curve
- cryptographic protocols
- ad hoc networks
- secret key
- key establishment
- operating system
- wireless sensor networks
- authentication protocol
- wireless ad hoc networks
- resource constrained
- lightweight
- security model
- authentication scheme
- private key
- real time
- symmetric key
- security analysis
- wireless networks
- identity based cryptography