From key predistribution to key redistribution (Q714775): Difference between revisions
From MaRDI portal
ReferenceBot (talk | contribs) Changed an Item |
Normalize DOI. |
||
(One intermediate revision by one other user not shown) | |||
Property / DOI | |||
Property / DOI: 10.1016/j.tcs.2012.06.001 / rank | |||
Property / DOI | |||
Property / DOI: 10.1016/J.TCS.2012.06.001 / rank | |||
Normal rank |
Latest revision as of 01:37, 10 December 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | From key predistribution to key redistribution |
scientific article |
Statements
From key predistribution to key redistribution (English)
0 references
11 October 2012
0 references
symmetric cryptography
0 references
key predistribution
0 references
wireless ad hoc network
0 references
eavesdropping
0 references
authentication
0 references
impersonation
0 references
attack detection
0 references
dynamic key management
0 references
combinatorial class
0 references
generating function
0 references
projective plane
0 references