Keyphrases
- key management
- overlay multicast
- key management scheme
- wireless sensor networks
- ad hoc networks
- resource constrained
- congestion control
- key distribution
- digital signature
- overlay network
- security threats
- secure communication
- provably secure
- key establishment
- identity based cryptography
- security services
- security protocols
- end to end
- secret key
- wireless ad hoc networks
- diffie hellman
- signcryption scheme
- elliptic curve
- routing protocol
- ip multicast
- database systems