Dynamic key management schemes for access control in a hierarchy.
Chu-Hsing LinPublished in: Comput. Commun. (1997)
Keyphrases
- access control
- key management
- key management scheme
- data security
- dynamic access control
- wireless sensor networks
- security policies
- security model
- security mechanisms
- ad hoc networks
- access control models
- security requirements
- access control policies
- role based access control
- resource constrained
- elliptic curve
- access control mechanism
- protection schemes
- routing protocol