1988
DOI: 10.1016/0166-218x(88)90068-6
|View full text |Cite
|
Sign up to set email alerts
|

Key storage in secure networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
69
0
3

Year Published

2000
2000
2011
2011

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 149 publications
(72 citation statements)
references
References 2 publications
0
69
0
3
Order By: Relevance
“…An interesting compromise between these two trivial solutions is the idea of a w-key distribution pattern (KDP ) [12]. A w-KDP is an allocation of keys to nodes with the property that:…”
Section: The Rise and Fall Of Combinatorial Key Predistributionmentioning
confidence: 99%
“…An interesting compromise between these two trivial solutions is the idea of a w-key distribution pattern (KDP ) [12]. A w-KDP is an allocation of keys to nodes with the property that:…”
Section: The Rise and Fall Of Combinatorial Key Predistributionmentioning
confidence: 99%
“…The applications employing preloaded subsets range from discovery of shared secrets for pairwise communications [16] - [23], and more general group communications [22], [24], and broadcast authentication [26], [27], [28]. While the earlier methods based on preloaded subsets favored deterministic allocation of keys to nodes [29] (most of them perhaps motivated by Erdos et. al's seminal work on intersections of finite sets [25]), Dyer et al [27] was perhaps the first to point out the advantages of random allocation of subsets.…”
Section: Random Key Pre-distribution Schemesmentioning
confidence: 99%
“…Stinson et al [37] discusses relations between these structures. We choose the language of cover-free families since they have found multiple applications in cryptography (see [20,26,36] for examples).…”
Section: Nonadaptive Group Testing With Cover-free Familiesmentioning
confidence: 99%