C Chen, MA Jensen - IEEE Transactions on Mobile Computing, 2011 - computer.org
When implementing data encryption and decryption in a symmetric cryptosystem, secure
distribution of the secret key to legitimate nodes can be a challenge. In this paper, we …