Skip to search formSkip to main contentSkip to account menu

Key authentication

Key authentication is used to solve the problem of authenticating the keys of the person (say "person B") to whom some other person ("person A") is… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
The growing popularity and evolutionary nature of Wireless local area networks have raised some serious security issues to its… 
2012
2012
Group key transfer protocols depend on a mutually trusted key generation center (KGC) to transport the group key to all group… 
2009
2009
The characteristics of mobile ad hoc networks cause a number of challenges to security design such as lack of infrastructure… 
2007
2007
Handoff process in IEEE 802.11 wireless networks must be accomplished with as little interruption as possible to maintain the… 
2006
2006
2006
In this paper, we propose a new architecture based on an efficient trust model and clustering algorithm in order to distribute a… 
2006
2006
An Mobile Ad-hoc network (MANET) is formed when group of mobile wireless nodes collaborate between them to communicate through… 
2006
2006
Recent measurements for Public Key Cryptography (PKC) protocols on 8-bit wireless sensor nodes showed optimistic results. It has… 
1987
1987
This paper proposes a new user authentication scheme, which does not require a management file for users' passwords. It has a… 
1985
1985
A problem with conflicting goals of anonymity and authentication is defined and a cryptographic protocol that solves the problem…