Keyphrases
- query processing
- key management
- ad hoc networks
- security threats
- wireless sensor networks
- resource constrained
- key distribution
- key management scheme
- digital signature
- identity based cryptography
- secret sharing scheme
- secure communication
- secret key
- security services
- group communication
- security protocols
- elliptic curve
- provably secure
- bilinear pairings
- wireless ad hoc networks
- diffie hellman
- quality of service
- secret sharing
- real time
- wireless networks
- distributed systems
- data sets