Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,394,662 papers from all fields of science
Search
Sign In
Create Free Account
Dynamic secrets
Dynamic Secrets is a novel key management scheme for secure communications. It was proposed by Sheng Xiao, Weibo Gong, and Don Towsley. The first…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Broader (1)
Access control
Authentication
Communications security
Encryption
Key management
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A novel verifiable and unconditionally secure (m, t, n)-threshold multi-secret sharing scheme using overdetermined systems of linear equations over finite Galois fields
K. Faraoun
International Journal of Information and Computer…
2019
Corpus ID: 67867320
Threshold multi-secrets sharing schemes allow sharing a set of m secrets among n participants, while secrets can be revealed only…
Expand
2018
2018
Miracle-Making in Business and Career: Timeless Secrets for Anyone to Create a Best Possible Future
K. Koo
2018
Corpus ID: 166808639
2017
2017
DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security
Harsha B. Patil
,
P. G. Student
,
+8 authors
P. K. Khosla
2017
Corpus ID: 212596718
: The issues related to security and operation overcomes by the Division and Replication of Data in the Cloud for Optimal…
Expand
2016
2016
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
Erun Tromar
,
M. Heiderich
2016
Corpus ID: 51750641
Using Grid Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a…
Expand
2015
2015
Secret Communication Using Parallel Combinatory Spreading WFRFT
Xiaojie Fang
,
X. Sha
,
Li Yong
IEEE Communications Letters
2015
Corpus ID: 34179443
In this letter, a parallel-combinatory-spreading-based weighted fractional Fourier transform (PCS-WFRFT) system aiming to…
Expand
2015
2015
Design of High Speed Retransmission Protocols Based on Encryption Method for Smart Grid
R. Ramyadevi
,
M. Malarvizhi
2015
Corpus ID: 33173072
This paper introduces a set of low-complexity algorithms that when coupled with link layer retransmission mechanisms, strengthen…
Expand
2014
2014
Dynamic Key Management in a Smart Grid
Sheng Xiao
,
W. Gong
,
D. Towsley
2014
Corpus ID: 60121072
This chapter extends the discussion of dynamic secrets from the secure communication between Alice and Bob to the cryptographic…
Expand
2014
2014
Dynamic Wireless Security
Sheng Xiao
,
W. Gong
,
D. Towsley
2014
Corpus ID: 60288627
Wireless communication is a favorable environment for the idea of dynamic secrets due to its random nature. Noises, interferences…
Expand
2014
2014
Secrecy in Communications
Sheng Xiao
,
W. Gong
,
D. Towsley
2014
Corpus ID: 53725558
One goal of this chapter is to explore dynamic secrets from a theoretic point of view. We use a Venn diagram to illustrate the…
Expand
2010
2010
From uncertainty to secrecy: A dynamic approach
Sheng Xiao
,
W. Gong
,
D. Towsley
Conference Record of the Forty Fourth Asilomar…
2010
Corpus ID: 36586144
Uncertainty is the pseudonym for many unfavorable effects in both wired and wireless communications. When uncertainty presents…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE