From key predistribution to key redistribution
DOI10.1016/J.TCS.2012.06.001zbMATH Open1247.68016OpenAlexW2172467705MaRDI QIDQ714775FDOQ714775
Zbigniew Gołȩbiewski, Jacek Cichoń, Mirosław Kutyłowski
Publication date: 11 October 2012
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2012.06.001
Recommendations
generating functionauthenticationprojective planeeavesdroppingsymmetric cryptographyattack detectioncombinatorial classdynamic key managementimpersonationkey predistributionwireless ad hoc network
Cryptography (94A60) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30) Network design and communication in computer systems (68M10) Authentication, digital signatures and secret sharing (94A62)
Cites Work
Cited In (2)
This page was built for publication: From key predistribution to key redistribution
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q714775)