Keyphrases
- key management
- viewpoint
- security threats
- ad hoc networks
- identity based cryptography
- wireless sensor networks
- resource constrained
- key management scheme
- key distribution
- security services
- secret sharing scheme
- security protocols
- elliptic curve
- key pre distribution
- secret key
- digital signature
- provably secure
- group communication
- key establishment
- secure communication
- sensor networks
- wireless networks
- security mechanisms
- diffie hellman
- routing protocol
- end to end
- resource constraints