Combinatorial aspects of key predistribution for resource-constrained networks
To secure a network of small devices using symmetric key cryptography is a non-trivial task. Nevertheless, it is important because public key cryptography is computationally expensive and therefore infeasible 1.0 implement on some small, battery-powered devices with limited memory. We study methods...
Main Author: | |
---|---|
Published: |
University of London
2013
|
Subjects: | |
Online Access: | http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.603455 |