Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,217,434 papers from all fields of science
Search
Sign In
Create Free Account
Group key
In cryptography, a group key is a cryptographic key that is shared between a group of users. Typically, group keys are distributed by sending them to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Conditional access
Cryptography
Secure cryptoprocessor
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
A technique for sharing a digital image
Shih-Chieh Wei
,
Young-Chang Hou
,
Yen-Chun Lu
Comput. Stand. Interfaces
2015
Corpus ID: 385992
Review
2014
Review
2014
Security Analysis of DTLS Structure and Its Application to Secure Multicast Communication
S. Shaheen
,
M. Yousaf
International Conference on Frontiers of…
2014
Corpus ID: 14217858
Transport Layer Security (TLS) provides reliable and in-order communication. However due to its retransmission behavior it causes…
Expand
2012
2012
Monitoring threshold cryptography based wireless sensor networks with projective plane
H. Dey
,
Raja Datta
International Conference on Computers and Devices…
2012
Corpus ID: 26755784
Securing information transaction in a dynamic environment like wireless ad-hoc and sensor networks is a challenging task due to…
Expand
2007
2007
Key agreement for key hypergraph
I. Jeong
,
Dong Hoon Lee
Computers & security
2007
Corpus ID: 26844185
2006
2006
Scalable balanced batch rekeying for secure group communication
W. Ng
,
H. Cruickshank
,
Zhili Sun
Computers & security
2006
Corpus ID: 18206173
2006
2006
An efficient protocol for authentication and initial shared key establishment in clustered wireless sensor networks
Jibi Abraham
,
K. Ramanatha
IFIP International Conference on Wireless and…
2006
Corpus ID: 17265487
This paper proposes an efficient protocol for authentication and shared key establishment in hierarchical clustered wireless…
Expand
Highly Cited
2004
Highly Cited
2004
Security for cluster based ad hoc networks
V. Varadharajan
,
R. Shankaran
,
M. Hitchens
Computer Communications
2004
Corpus ID: 34800257
2003
2003
An Improved ID-based Authenticated Group Key Agreement Scheme
Xinjun Du
,
Y. Wang
,
Jianhua Ge
,
Yumin Wang
IACR Cryptology ePrint Archive
2003
Corpus ID: 44474163
Xinjun Du, Ying Wang, Jianhua Ge and Yumin Wang Key Laboratory of Computer Networks and Information Security Xidian University Xi…
Expand
2002
2002
Individual Authentication in Multiparty Communications
F. Bergadano
,
D. Cavagnino
,
B. Crispo
Computers & security
2002
Corpus ID: 3255805
1999
1999
Comments on "Dynamic Key Management Schemes for Access control in a Hierarchy"
N. Lee
,
T. Hwang
Computer Communications
1999
Corpus ID: 20177165
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE