Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,475,815 papers from all fields of science
Search
Sign In
Create Free Account
Cryptographic key types
One of the most important aspects of any cryptographic system is key management; which is very difficult and, therefore, sometimes neglected. A very…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Authentication
Authorization
CBC-MAC
Cryptographically secure pseudorandom number generator
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Mobile Objects Security Protocols
Dorin Simina
,
E. Todoran
International Symposium on Parallel and…
2011
Corpus ID: 9684990
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE