Skip to search formSkip to main contentSkip to account menu

Key distribution

In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
This paper proposes a hybrid crypto system that utilizes benefits of both symmetric key and public key cryptographic methods… 
Highly Cited
2011
Highly Cited
2011
The MapReduce parallel computational model is of increasing importance. A number of High Level Query Languages (HLQLs) have been… 
Review
2006
Review
2006
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide… 
Highly Cited
2003
Highly Cited
2003
Mobile agents are software entities consisting of code and data that can migrate autonomously from host to host executing their… 
Review
2002
Review
2002
Intrusion tolerant systems provide high-integrity and high-availability services to their clients in the face of successful… 
Highly Cited
1988