Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,321 papers from all fields of science
Search
Sign In
Create Free Account
Key authentication
Key authentication is used to solve the problem of authenticating the keys of the person (say "person B") to whom some other person ("person A") is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
Access control
Alice and Bob
Certificate authority
Diffie–Hellman key exchange
Expand
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Performance analysis of wireless network with the impact of security mechanisms
Mudassar Ahmad
,
Sumaira Taj
,
Tasleem Mustafa
,
Md Asri
International Conference on Emerging Technologies
2012
Corpus ID: 11194060
The growing popularity and evolutionary nature of Wireless local area networks have raised some serious security issues to its…
Expand
2012
2012
A novel Group Key Transfer Protocol
Chingfang Hsu
,
Bing Zeng
,
Qi Cheng
,
Guohua Cui
IACR Cryptology ePrint Archive
2012
Corpus ID: 15612402
Group key transfer protocols depend on a mutually trusted key generation center (KGC) to transport the group key to all group…
Expand
2009
2009
A Trust Based Threshold Cryptography Key Management for Mobile Ad Hoc Networks
H. Dahshan
,
J. Irvine
IEEE 70th Vehicular Technology Conference Fall
2009
Corpus ID: 27832510
The characteristics of mobile ad hoc networks cause a number of challenges to security design such as lack of infrastructure…
Expand
2007
2007
Using Shared Beacon Channel for Fast Handoff in IEEE 802.11 Wireless Networks
Jaeouk Ok
,
Pedro Morales
,
A. Darmawan
,
H. Morikawa
IEEE Vehicular Technology Conference
2007
Corpus ID: 14808343
Handoff process in IEEE 802.11 wireless networks must be accomplished with as little interruption as possible to maintain the…
Expand
2006
2006
Open-Source Model Checking
R. Grosu
,
Xiaowan Huang
,
Sumit Jain
,
S. Smolka
SoftMC@CAV
2006
Corpus ID: 18906330
2006
2006
A Secure Architecture for Mobile Ad Hoc Networks
A. Rachedi
,
A. Benslimane
International Conference on Mobile Ad-hoc and…
2006
Corpus ID: 7833951
In this paper, we propose a new architecture based on an efficient trust model and clustering algorithm in order to distribute a…
Expand
2006
2006
Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks
A. Rachedi
,
A. Benslimane
International Conference on Systems and Networks…
2006
Corpus ID: 18623668
An Mobile Ad-hoc network (MANET) is formed when group of mobile wireless nodes collaborate between them to communicate through…
Expand
2006
2006
Cooperative Public Key Authentication Protocol in Wireless Sensor Network
Daehun Nyang
,
Aziz Mohaisen
International Conference on Ubiquitous…
2006
Corpus ID: 14231513
Recent measurements for Public Key Cryptography (PKC) protocols on 8-bit wireless sensor nodes showed optimistic results. It has…
Expand
1987
1987
A single public-key authentication scheme for multiple users
T. Okamoto
Systems and Computers in Japan
1987
Corpus ID: 28370387
This paper proposes a new user authentication scheme, which does not require a management file for users' passwords. It has a…
Expand
1985
1985
Cryptographic Protocol for Trustable Match Making
R. Baldwin
,
Wayne Gramlich
IEEE Symposium on Security and Privacy
1985
Corpus ID: 15759051
A problem with conflicting goals of anonymity and authentication is defined and a cryptographic protocol that solves the problem…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE