... Wireless Systems,Barcelona, Spain, May 2010.[20] I. Askoxylakis, K. Markantonakis, T. Tryfonas, J. May, and A. Traganitis, A face centered cubic key agreement mechanism for mobile ad hoc networks,” ... following: there aretwo parties A, B that share a password P.Bothpartiesuse a suitable symmetric cryptosystem but entity A has also theability to create a random asymmetric key pair, (e A , d A ).During ... provide a broad range of mission critical applications. While offering many advantages, such as flexibilit y,easy of deployment and low cost, MANETs and mesh networks face important security and resilience...