Skip to search formSkip to main contentSkip to account menu

Key distribution

In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Modern cryptography offers three goals of Confidentiality, Integrity and Availability, known as CIA triad. Confidentiality of any… 
2012
2012
This paper proposes a hybrid crypto system that utilizes benefits of both symmetric key and public key cryptographic methods… 
Highly Cited
2011
Highly Cited
2011
The MapReduce parallel computational model is of increasing importance. A number of High Level Query Languages (HLQLs) have been… 
2011
2011
Cloud computing entails a novel security threat: The cloud service provider is entrusted with the data of all its customers. This… 
Review
2006
Review
2006
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide… 
Highly Cited
2003
Highly Cited
2003
Mobile agents are software entities consisting of code and data that can migrate autonomously from host to host executing their… 
2003
2003
The Security Protocol Game is a highly visual and interactive game for teaching secure data communication protocols. Students use…