Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,348,067 papers from all fields of science
Search
Sign In
Create Free Account
Key distribution
In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Broadcast encryption
Key (cryptography)
Key distribution in wireless sensor networks
Key server (cryptographic)
Expand
Broader (2)
Cloud computing
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Large scale wireless sensor networks with multi-level dynamic key management scheme
O. K. Sahingoz
Journal of systems architecture
2013
Corpus ID: 39578521
2012
2012
Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems
Adnan Gutub
,
Farhan Khan
International Conference on Advanced Computer…
2012
Corpus ID: 18059869
This paper proposes a hybrid crypto system that utilizes benefits of both symmetric key and public key cryptographic methods…
Expand
Highly Cited
2011
Highly Cited
2011
Comparing High Level MapReduce Query Languages
Robert J. Stewart
,
P. Trinder
,
Hans-Wolfgang Loidl
Advanced Parallel Programming Technologies
2011
Corpus ID: 829167
The MapReduce parallel computational model is of increasing importance. A number of High Level Query Languages (HLQLs) have been…
Expand
Highly Cited
2008
Highly Cited
2008
An Application-Oriented Framework for Wireless Sensor Network Key Establishment
K. Martin
,
Maura B. Paterson
WCAN@ICALP
2008
Corpus ID: 10546803
2008
2008
Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
I. Raza
,
S. Hussain
Computer Communications
2008
Corpus ID: 2819687
Review
2006
Review
2006
A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1 . 1 June 2 , 2006
Emanuel Fonseca
,
Andreas Festag
2006
Corpus ID: 2198668
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide…
Expand
2006
2006
Smart Dust Security - Key Infection Revisited
Daniel Cvrcek
,
P. Švenda
International Workshop on Security and Trust…
2006
Corpus ID: 5503529
Highly Cited
2003
Highly Cited
2003
A protocol for detecting malicious hosts based on limiting the execution time of mobile agents
O. Esparza
,
M. Soriano
,
J. L. Muñoz
,
J. Forné
Proceedings of the Eighth IEEE Symposium on…
2003
Corpus ID: 40683371
Mobile agents are software entities consisting of code and data that can migrate autonomously from host to host executing their…
Expand
Review
2002
Review
2002
Developing a heterogeneous intrusion tolerant CORBA system
D. Sames
,
B. Matt
,
B. Niebuhr
,
G. Tally
,
B. Whitmore
,
D. Bakken
Proceedings : International Conference on…
2002
Corpus ID: 14416232
Intrusion tolerant systems provide high-integrity and high-availability services to their clients in the face of successful…
Expand
Highly Cited
1988
Highly Cited
1988
Key storage in secure networks
C. Mitchell
,
F. Piper
Discrete Applied Mathematics
1988
Corpus ID: 17674805
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE