Combinatorial aspects of key predistribution for resource-constrained networks

To secure a network of small devices using symmetric key cryptography is a non-trivial task. Nevertheless, it is important because public key cryptography is computationally expensive and therefore infeasible 1.0 implement on some small, battery-powered devices with limited memory. We study methods...

Full description

Bibliographic Details
Main Author: Kendall, Michelle Louise
Published: University of London 2013
Subjects:
Online Access:http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.603455