... Wireless Systems,Barcelona, Spain, May 2010.[20] I. Askoxylakis, K. Markantonakis, T. Tryfonas, J. May, and A. Traganitis, A face centered cubic key agreement mechanism for mobile ad hoc networks,” ... following: there aretwo parties A, B that share a password P.Bothpartiesuse a suitable symmetric cryptosystem but entity A has also theability to create a random asymmetric key pair, (e A , d A ).During ... beginning, weusually observe ad hoc groups working as independent teamsthat arr ive at place independently. These teams graduallybecome part of coordinated action by a central disastermanagement entity,...