Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,760 papers from all fields of science
Search
Sign In
Create Free Account
Key distribution
In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Broadcast encryption
Key (cryptography)
Key distribution in wireless sensor networks
Key server (cryptographic)
Expand
Broader (2)
Cloud computing
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
One time pad generation using quantum superposition states
Gaurav Upadhyay
,
M. Nene
IEEE International Conference on Recent Trends in…
2016
Corpus ID: 16783062
Modern cryptography offers three goals of Confidentiality, Integrity and Availability, known as CIA triad. Confidentiality of any…
Expand
Highly Cited
2013
Highly Cited
2013
Large scale wireless sensor networks with multi-level dynamic key management scheme
O. K. Sahingoz
Journal of systems architecture
2013
Corpus ID: 39578521
2012
2012
Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems
Adnan Gutub
,
Farhan Khan
International Conference on Advanced Computer…
2012
Corpus ID: 18059869
This paper proposes a hybrid crypto system that utilizes benefits of both symmetric key and public key cryptographic methods…
Expand
Highly Cited
2011
Highly Cited
2011
Comparing High Level MapReduce Query Languages
Robert J. Stewart
,
P. Trinder
,
Hans-Wolfgang Loidl
Advanced Parallel Programming Technologies
2011
Corpus ID: 829167
The MapReduce parallel computational model is of increasing importance. A number of High Level Query Languages (HLQLs) have been…
Expand
2011
2011
Secure and Sustainable Benchmarking in Clouds
F. Kerschbaum
Business & Information Systems Engineering
2011
Corpus ID: 16969827
Cloud computing entails a novel security threat: The cloud service provider is entrusted with the data of all its customers. This…
Expand
Highly Cited
2008
Highly Cited
2008
An Application-Oriented Framework for Wireless Sensor Network Key Establishment
K. Martin
,
Maura B. Paterson
WCAN@ICALP
2008
Corpus ID: 10546803
Review
2006
Review
2006
A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1 . 1 June 2 , 2006
Emanuel Fonseca
,
Andreas Festag
2006
Corpus ID: 2198668
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide…
Expand
2004
2004
Testing the entanglement of intense beams produced by a non-degenerate optical parametric oscillator
A. Villar
,
M. Martinelli
,
P. Nussenzveig
2004
Corpus ID: 54711091
Highly Cited
2003
Highly Cited
2003
A protocol for detecting malicious hosts based on limiting the execution time of mobile agents
O. Esparza
,
M. Soriano
,
J. L. Muñoz
,
J. Forné
Proceedings of the Eighth IEEE Symposium on…
2003
Corpus ID: 40683371
Mobile agents are software entities consisting of code and data that can migrate autonomously from host to host executing their…
Expand
2003
2003
Teaching secure communication protocols using a game representation
Len Hamey
2003
Corpus ID: 7198889
The Security Protocol Game is a highly visual and interactive game for teaching secure data communication protocols. Students use…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE