Skip to search formSkip to main contentSkip to account menu

Key distribution

In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
La infraestructura de clave publica (PKI) es un componente necesario para el funcionamiento de las comunicaciones seguras… 
2014
2014
In this paper, vehicular ad hoc networks (VANETs) is used to collect and aggregate real-time speed and position information on… 
2013
2013
Biometric security is concerned with the assurance of confidentiality, integrity, and availability of information in all forms… 
2011
2011
Cloud computing entails a novel security threat: The cloud service provider is entrusted with the data of all its customers. This… 
Review
2006
Review
2006
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide… 
2006
2006
The construction for a P2P-based high performance computing platform (P2HP) is presented to address parallel problems in this… 
2004
2004
An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established… 
2003
2003
The Security Protocol Game is a highly visual and interactive game for teaching secure data communication protocols. Students use… 
2000
2000
Secure electronic communication relies on the application of cryptography. However, even with perfect encryption, communication… 
1995
1995
The Internet continues its triumphant advance. It is commonly seen as the first incarnation of an information superhighway, or a…