From key predistribution to key redistribution
DOI10.1016/J.TCS.2012.06.001zbMath1247.68016OpenAlexW2172467705MaRDI QIDQ714775
Zbigniew Gołȩbiewski, Jacek Cichoń, Mirosław Kutyłowski
Publication date: 11 October 2012
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2012.06.001
generating functionprojective planeauthenticationeavesdroppingsymmetric cryptographyattack detectioncombinatorial classdynamic key managementimpersonationkey predistributionwireless ad hoc network
Network design and communication in computer systems (68M10) Cryptography (94A60) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30) Authentication, digital signatures and secret sharing (94A62)
Related Items (1)
Cites Work
This page was built for publication: From key predistribution to key redistribution