Skip to search formSkip to main contentSkip to account menu

Key exchange

Known as: Key-exchange algorithm, Key Exchange Algorithm, Kex 
Key exchange (also known as "key establishment") is any method in cryptography by which cryptographic keys are exchanged between two parties… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
  • Q. Pu
  • 2010
  • Corpus ID: 16762226
Most recently, Yang et al proposed a new set of security requirements for two-factor smart-card-based password mutual… 
2010
2010
Two Phase geographic Greedy Forwarding (TPGF) is a pure on-demand geographic greedy forwarding protocol for wireless multimedia… 
Highly Cited
2009
Highly Cited
2009
. Path-key establishment has become accepted as a commonly used solution in wireless sensor networks (WSNs) for protecting node… 
2007
2007
In this paper we introduce a link layer security platform for wireless sensor networks. At the heart of this platform, lies our… 
2007
2007
The main purpose of this study is to investigate how to provide authentication in wireless sensor networks and how it can be done… 
2005
2005
Key establishment between neighboring nodes is a fundamental issue for securing sensor networks deployed in unattended and… 
2003
2003
We present a new multiplication algorithm for the implementation of elliptic curve cryptography (ECC) over the finite extension… 
2003
2003
We present high-resolution (R = 50,000) spectra at 2.2 μm of 16 young stars in the ρ Ophiuchi dark cloud. Photospheric features… 
Highly Cited
1997
Highly Cited
1997
The reaction between MnCl 2 ·4H 2 O, Hhmp (Hhmp = 2-hydroxymethylpyridine) and NEt 4 MnO 4 in MeCN gives NEt 4… 
Review
1997
Review
1997
The importance of clarifying the goals of a cryptographic protocol is widely recognised. The majority of authors have addressed…