Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,384,112 papers from all fields of science
Search
Sign In
Create Free Account
Key distribution
In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Broadcast encryption
Key (cryptography)
Key distribution in wireless sensor networks
Key server (cryptographic)
Expand
Broader (2)
Cloud computing
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
ClaimChain: Decentralized Public Key Infrastructure
Bogdan Kulynych
,
Marios Isaakidis
,
C. Troncoso
,
G. Danezis
arXiv.org
2017
Corpus ID: 29513717
La infraestructura de clave publica (PKI) es un componente necesario para el funcionamiento de las comunicaciones seguras…
Expand
2014
2014
An Intelligent Secure Traffic Management System Based On Vanet
E. Abinaya
,
R. Sekar
2014
Corpus ID: 14083067
In this paper, vehicular ad hoc networks (VANETs) is used to collect and aggregate real-time speed and position information on…
Expand
2013
2013
Implementation of Secure Biometric Authentication
S. ShashidharM
,
D. Suresha
2013
Corpus ID: 212586671
Biometric security is concerned with the assurance of confidentiality, integrity, and availability of information in all forms…
Expand
2011
2011
Secure and Sustainable Benchmarking in Clouds
F. Kerschbaum
Business & Information Systems Engineering
2011
Corpus ID: 16969827
Cloud computing entails a novel security threat: The cloud service provider is entrusted with the data of all its customers. This…
Expand
Review
2006
Review
2006
A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1 . 1 June 2 , 2006
Emanuel Fonseca
,
Andreas Festag
2006
Corpus ID: 2198668
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide…
Expand
2006
2006
Constructing a P2P-Based High Performance Computing Platform
Hai Jin
,
F. Luo
,
Xiaofei Liao
,
Qin Zhang
,
H. Zhang
International Conference on Conceptual Structures
2006
Corpus ID: 41506922
The construction for a P2P-based high performance computing platform (P2HP) is presented to address parallel problems in this…
Expand
2004
2004
An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks
M. Bouassida
,
I. Chrisment
,
O. Festor
NETWORKING
2004
Corpus ID: 15728924
An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established…
Expand
2003
2003
Teaching secure communication protocols using a game representation
Len Hamey
2003
Corpus ID: 7198889
The Security Protocol Game is a highly visual and interactive game for teaching secure data communication protocols. Students use…
Expand
2000
2000
Detecting Intrusions in Security Protocols
Alec Yasinsac
2000
Corpus ID: 14910941
Secure electronic communication relies on the application of cryptography. However, even with perfect encryption, communication…
Expand
1995
1995
Internet Security Enters the Middle Ages
R. Oppliger
Computer
1995
Corpus ID: 206403045
The Internet continues its triumphant advance. It is commonly seen as the first incarnation of an information superhighway, or a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required