A Hierarchical Key Management Scheme for End-to-End Encryption in Internet Environments.
Wen-Pai LuMalur K. SundareshanPublished in: IEEE Symposium on Security and Privacy (1986)
Keyphrases
- end to end
- key management
- ad hoc networks
- key management scheme
- internet protocol
- wireless ad hoc networks
- network topology
- multipath
- congestion control
- routing algorithm
- transport protocol
- resource constrained
- elliptic curve
- admission control
- wireless sensor networks
- key distribution
- application layer
- multi hop
- security protocols
- secret key
- base station
- data streams
- rate adaptation
- text localization and recognition