Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,393,519 papers from all fields of science
Search
Sign In
Create Free Account
Blom's scheme
Blom's scheme is a symmetric threshold key exchange protocol in cryptography. The scheme was proposed by the Swedish cryptographer Rolf Blom in a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Alice and Bob
Cryptography
High-bandwidth Digital Content Protection
Key distribution in wireless sensor networks
Expand
Broader (2)
Key management
Secret sharing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Rhizomelic Chondrodysplasia Punctata: A Case Report
Trupti Joshi
,
Amol Joshi
,
Rakesh R. Chikhlonde
,
L. Deshmukh
2015
Corpus ID: 57988750
Rhizomelic Chondrodysplasia Punctata (RCDP), a rare autosomal recessive disorder due to defective peroxisome metabolism, is…
Expand
2013
2013
The impact of EU consumption on deforestation: Proposal of specific Community policy, legislative measures and other initiatives for further consideration by the Commission
N. Devriendt
,
A. Lust
,
+10 authors
C. Nie
2013
Corpus ID: 169010049
2013
2013
In the name of atheism: a critical response to Philipp Blom's book 'A wicked company'
E. V. Dam
2013
Corpus ID: 170892657
ly theorizing about its sterile conditions and forgetting to live it. Indeed, Blom overlooks some crucial elements at work in his…
Expand
2013
2013
Computational Analysis of Modified Blom's Scheme
Suraj Sukumar
arXiv.org
2013
Corpus ID: 12637967
To achieve security in wireless networks, it is important to be able to encrypt and authenticate messages sent among sensor nodes…
Expand
2010
2010
EVIDENCE OF WALLS IN OBLIQUE IMAGES FOR AUTOMATIC VERIFICATION OF BUILDINGS
A. P. Nyaruhuma
,
M. Gerke
,
G. Vosselman
2010
Corpus ID: 44739475
With the availability of airborne sensor platforms capable of capturing multiple overlapping images, oblique images have become…
Expand
2009
2009
Analysis of Hungarian sport horse show jumping results using different transformations and models
J. Posta
,
S. Mihók
,
Szilárd Márkus
,
I. Komlósi
2009
Corpus ID: 39122098
Abstract. The aim of this paper is to estimate heritabilities and to compare data transformation methods and models for Hungarian…
Expand
2005
2005
Key establishment in sensor networks based on triangle grid deployment model
Yun Zhou
,
Yanchao Zhang
,
Yuguang Fang
IEEE Military Communications Conference
2005
Corpus ID: 3332089
Key establishment between neighboring nodes is a fundamental issue for securing sensor networks deployed in unattended and…
Expand
1995
1995
Distribución de Quassia amara L. ex Blom en Costa Rica, y su relación con los contenidos de cuasina y neocuasina (insecticidas naturales) en sus tejidos
R. Soto
1995
Corpus ID: 192986077
1986
1986
Aerodynamic Properties of Buttons and Button-Assisted Oesophageal Speech
G. Nieboer
,
H. K. Schutte
1986
Corpus ID: 59683259
The last three years have produced several articles on button aerodynamics. Weinberg, Horii, and Singer and Blom (Weinberg et al…
Expand
1984
1984
[Experiences with the Blom-Singer prosthesis following Blom-Singer puncture and following functionally disordered neoglottis phonatria].
Herrmann If
,
Zenner Hp
1984
Corpus ID: 59557986
: The Blom-Singer puncture is a new operative technique which can help to make the laryngectomized patient speak again even years…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required