Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,965,372 papers from all fields of science
Search
Sign In
Create Free Account
Ephemeral key
A cryptographic key is called ephemeral if it is generated for each execution of a key establishment process. In some cases ephemeral keys are used…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
CryptoNote
Cryptographic key types
Cryptography
Diffie–Hellman key exchange
Expand
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Large fluctuations of shallow seas in low‐lying Southeast Asia driven by mantle flow
S. Zahirovic
,
N. Flament
,
R. Dietmar Müller
,
M. Seton
,
M. Gurnis
2016
Corpus ID: 19162252
The Sundaland continental promontory, as the core of Southeast Asia, is one of the lowest lying continental regions, with half of…
Expand
2016
2016
The Mimir Approach to Transactional Output
Tingzhe Zhou
,
Michael F. Spear
2016
Corpus ID: 15365078
In order to use transactional memory (TM) in place of locks, it is necessary to design linguistic mechanisms that enable…
Expand
2012
2012
Water Quality Trends and Nutrient Loads for the Watershed Research and Education Center in Northwest Arkansas, 2009-2012
J. T. Metrailer
2012
Corpus ID: 126627240
Nitrogen, phosphorus, and sediment transport is a concern for Northwest Arkansas due to high exports through riverine discharge…
Expand
2010
2010
DEVELOPMENT AND APPLICATION OF GULLY EROSION COMPONENTS WITHIN THE USDA ANNAGNPS WATERSHED MODEL FOR PRECISION CONSERVATION
R. Bingner
,
R. Wells
,
H. Momm
,
L. Frees
2010
Corpus ID: 18431941
A watershed scale assessment of the effect of conservation practices on the environment is critical when recommending…
Expand
2008
2008
Characterization of a Mediterranean flash flood event using rain gauges, radar, GIS and lightning data
M. Barnolas
,
Aitor Atencia
,
M. Llasat
,
T. Rigo
2008
Corpus ID: 39439927
Abstract. Flash flood events are very common in Catalonia, generating a high impact on society, including losses in life almost…
Expand
2006
2006
Self-certified public key generation on the intel mote 2 sensor network platform
O. Arazi
,
I. Elhanany
,
D. Rose
,
H. Qi
,
B. Arazi
IEEE Workshop on Wireless Mesh Networks
2006
Corpus ID: 6055630
It is widely acknowledged that security will play a key role in the successful design and deployment of wireless sensor networks…
Expand
2003
2003
A treatise on Buddhist epistemology and logic attributed to Klong chen rab 'byams pa (1308-1364) and its place in Indo-Tibetan intellectual history
L. Kuijp
2003
Corpus ID: 170321962
an . av ¯ arttika [hereafter PV] 2 by the great Tibetan scholar and visionary Klong chen Rab ’byams pa of the Rnying ma pa school…
Expand
1999
1999
Modern Languages and CD-ROM-based Learning
Elaine Pawling
British Journal of Educational Technology
1999
Corpus ID: 8270723
This article investigates the nature of language learning using CD-ROM packages. The research explores cognitive processes and…
Expand
1997
1997
The morphology, dynamics and late quaternary sediments history of ephemeral drainage systems on the Northern Plains of central Australia
S. Tooth
1997
Corpus ID: 129802063
1986
1986
Long-term trends in algal-dominated rocky subtidal communities on the Swedish west coast — a transitional system?
T. Lundälv
,
C. Larsson
,
L. Axelsson
Hydrobiologia
1986
Corpus ID: 32250467
Rocky subtidal communities on the Swedish west coast were monitored over approximately 16 years (1970–1985) by means of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE