Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,533,070 papers from all fields of science
Search
Sign In
Create Free Account
Key exchange
Known as:
Key-exchange algorithm
, Key Exchange Algorithm
, Kex
Expand
Key exchange (also known as "key establishment") is any method in cryptography by which cryptographic keys are exchanged between two parties…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
Algorithm
BB84
Batch cryptography
Blom's scheme
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
An improved dynamic ID-based remote user authentication with key agreement scheme
Fengtong Wen
,
Xuelei Li
Computers & electrical engineering
2012
Corpus ID: 46553276
Highly Cited
2011
Highly Cited
2011
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
Chun-Ta Li
,
M. Hwang
Information Sciences
2011
Corpus ID: 11133949
Highly Cited
2011
Highly Cited
2011
Key Predistribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks
A. Rasheed
,
R. Mahapatra
IEEE Transactions on Parallel and Distributed…
2011
Corpus ID: 16123083
Security services such as authentication and pairwise key establishment are critical to sensor networks. They enable sensor nodes…
Expand
Highly Cited
2009
Highly Cited
2009
An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks
Chunhai Li
,
Min-Shiang Hwang
,
Yen-Ping Chu
2009
Corpus ID: 64538240
. Path-key establishment has become accepted as a commonly used solution in wireless sensor networks (WSNs) for protecting node…
Expand
Highly Cited
2009
Highly Cited
2009
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
Taek-Young Youn
,
Young-Ho Park
,
Jongin Lim
IEEE Communications Letters
2009
Corpus ID: 11939245
Recently, Chang, Lee, and Chiu proposed an enhanced anonymous authentication scheme which permits mobile users to anonymously…
Expand
Highly Cited
2007
Highly Cited
2007
A Hierarchical Key Establishment Scheme forWireless Sensor Networks
Jamil Ibriq
,
I. Mahgoub
International Conference on Advanced Information…
2007
Corpus ID: 18406528
This paper presents hierarchical key establishment scheme (HIKES) for wireless sensor networks. In this scheme, the base station…
Expand
Highly Cited
2005
Highly Cited
2005
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
Takashi Ito
,
H. Ohta
,
Nori Matsuda
,
Takeshi Yoneda
ACM Workshop on Security of ad hoc and Sensor…
2005
Corpus ID: 13342918
Pairwise key establishment is a fundamental service provided in secure sensor networks. However, due to resource constraints…
Expand
2005
2005
Path key establishment using multiple secured paths in wireless sensor networks
Guanfeng Li
,
Hui Ling
,
T. Znati
Conference on Emerging Network Experiment and…
2005
Corpus ID: 16851703
Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy limits of individual sensor…
Expand
2002
2002
Group Key Establishment in Wireless Ad Hoc Networks
Eric Ricardo Anton
2002
Corpus ID: 18494305
This paper analyzes security issues of wireless ad hoc networks. This new environment, unlike traditional networks, has no…
Expand
Highly Cited
1997
Highly Cited
1997
A new manganese cluster topology capable of yielding high-spinspecies: mixed-valence[Mn7(OH)3Cl3(hmp)9]2+ with S ≥ 10
M. A. Bolcar
,
S. Aubin
,
K. Folting
,
D. Hendrickson
,
G. Christou
1997
Corpus ID: 94866683
The reaction between MnCl 2 ·4H 2 O, Hhmp (Hhmp = 2-hydroxymethylpyridine) and NEt 4 MnO 4 in MeCN gives NEt 4…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE