Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,297,564 papers from all fields of science
Search
Sign In
Create Free Account
Key disclosure law
Known as:
Mandatory key disclosure law
, Mandatory key disclosure
, Mandatory decryption law
Expand
Key disclosure laws, also known as mandatory key disclosure, is legislation that requires individuals to surrender cryptographic keys to law…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
BestCrypt
Cryptography
Cryptography law
Deniable encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Staying Silent from the Competitors Examining the effects of product substitutability on disclosure redaction
Miaomiao Yu
2017
Corpus ID: 40854739
This study examines the effects of product substitutability on disclosure redactions. Two types of product market threat to…
Expand
2013
2013
Towards Secure and Dynamic Password Based User Authentication Scheme in Hierarchical Wireless Sensor Networks
Chun-Ta Li
,
C. Weng
,
Cheng-Chi Lee
,
Chin-Wen Lee
2013
Corpus ID: 37001783
Two-factor user authentication is an important research issue for providing security and privacy in hierarchical wireless sensor…
Expand
2013
2013
Performance evaluation of key disclosure delay-based schemes in wireless sensor networks
Wafa Ben Jaballah
,
M. Mosbah
,
H. Youssef
IEEE International Conference on Pervasive…
2013
Corpus ID: 18367628
Broadcast source authentication is a critical security service in wireless sensor networks which is still in its infancy. This…
Expand
2012
2012
A Password and Smart Card Based User Authentication Mechanism for Multi-Server Environments
Chun-Ta Li
,
Cheng-Chi Lee
,
Hsing Mei
,
Chia-Hao Yang
2012
Corpus ID: 5730022
Secure user authentication without repeating registration is one of the important issues in multi-server networks that needs to…
Expand
2011
2011
Cryptanalysis of Hsiang‐Shih's authentication scheme for multi‐server architecture
Kuo-Hui Yeh
,
N. Lo
,
Yingjiu Li
International Journal of Communication Systems
2011
Corpus ID: 29328259
From user point of view, password‐based remote user authentication technique is one of the most convenient and easy‐to‐use…
Expand
2009
2009
A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks
T. Parker
,
Shouhuai Xu
International Conference on Trusted Systems
2009
Corpus ID: 20379329
Security of cryptographic mechanisms is ultimately based on the assumption that cryptographic keys are kept (absolutely) secret…
Expand
2009
2009
Treat-before-trick : Free-riding prevention for BitTorrent-like peer-to-peer networks
Kyuyong Shin
,
D. Reeves
,
I. Rhee
IEEE International Symposium on Parallel…
2009
Corpus ID: 1104990
In P2P file sharing systems, free-riders who use others' resources without sharing their own cause system-wide performance…
Expand
2006
2006
Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security
Qing Li
,
W. Trappe
IEEE Transactions on Information Forensics and…
2006
Corpus ID: 10639338
Many techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in…
Expand
2003
2003
A novel video multicast instant source authentication model based on digital watermarking and TESLA
Jun Yao
,
Anjun Zhao
,
Lei Guo
International Conference on Communication…
2003
Corpus ID: 61610936
A novel video multicast instant source authentication model based on digital video watermarking and TESLA (timed efficient stream…
Expand
2002
2002
GlobeSpan, Inc. v. O'Neill
Danielle Pasqalone
2002
Corpus ID: 150740126
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE