Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,975,871 papers from all fields of science
Search
Sign In
Create Free Account
Key exchange
Known as:
Key-exchange algorithm
, Key Exchange Algorithm
, Kex
Expand
Key exchange (also known as "key establishment") is any method in cryptography by which cryptographic keys are exchanged between two parties…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
Algorithm
BB84
Batch cryptography
Blom's scheme
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
An Improved Two-factor Authentication Protocol
Q. Pu
Second International Conference on Multimedia and…
2010
Corpus ID: 16762226
Most recently, Yang et al proposed a new set of security requirements for two-factor smart-card-based password mutual…
Expand
2010
2010
Secured Two Phase Geographic Forwarding Protocol in Wireless Multimedia Sensor Networks
Taye Mulugeta
,
Lei Shu
,
M. Hauswirth
,
Min Chen
,
T. Hara
,
S. Nishio
IEEE Global Telecommunications Conference…
2010
Corpus ID: 1466570
Two Phase geographic Greedy Forwarding (TPGF) is a pure on-demand geographic greedy forwarding protocol for wireless multimedia…
Expand
Highly Cited
2009
Highly Cited
2009
An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks
Chunhai Li
,
M. Hwang
,
Yen-Ping Chu
2009
Corpus ID: 64538240
. Path-key establishment has become accepted as a commonly used solution in wireless sensor networks (WSNs) for protecting node…
Expand
2007
2007
Providing Transparent Security Services to Sensor Networks
H. Soroush
,
M. Salajegheh
,
T. Dimitriou
IEEE International Conference on Communications
2007
Corpus ID: 5877248
In this paper we introduce a link layer security platform for wireless sensor networks. At the heart of this platform, lies our…
Expand
2007
2007
Energy efficient authentication in wireless sensor networks
Rickard Soderlund
,
Stefan Svensson
,
Tomas Lennvall
IEEE Conference on Emerging Technologies and…
2007
Corpus ID: 17293834
The main purpose of this study is to investigate how to provide authentication in wireless sensor networks and how it can be done…
Expand
2005
2005
Key establishment in sensor networks based on triangle grid deployment model
Yun Zhou
,
Yanchao Zhang
,
Yuguang Fang
IEEE Military Communications Conference
2005
Corpus ID: 3332089
Key establishment between neighboring nodes is a fundamental issue for securing sensor networks deployed in unattended and…
Expand
2003
2003
Efficient multiplication in GF(p/sup k/) for elliptic curve cryptography
J. Bajard
,
L. Imbert
,
C. Nègre
,
T. Plantard
Proceedings 16th IEEE Symposium on Computer…
2003
Corpus ID: 46064714
We present a new multiplication algorithm for the implementation of elliptic curve cryptography (ECC) over the finite extension…
Expand
2003
2003
Stellar Properties of Pre-Main-Sequence Stars from High-Resolution Near-Infrared Spectra
G. Doppmann
,
G. Doppmann
,
+4 authors
R. White
2003
Corpus ID: 16888730
We present high-resolution (R = 50,000) spectra at 2.2 μm of 16 young stars in the ρ Ophiuchi dark cloud. Photospheric features…
Expand
Highly Cited
1997
Highly Cited
1997
A new manganese cluster topology capable of yielding high-spinspecies: mixed-valence[Mn7(OH)3Cl3(hmp)9]2+ with S ≥ 10
M. A. Bolcar
,
S. Aubin
,
K. Folting
,
D. Hendrickson
,
G. Christou
1997
Corpus ID: 94866683
The reaction between MnCl 2 ·4H 2 O, Hhmp (Hhmp = 2-hydroxymethylpyridine) and NEt 4 MnO 4 in MeCN gives NEt 4…
Expand
Review
1997
Review
1997
Towards Extensional Goals in Authentication Protocols
C. Boyd
1997
Corpus ID: 17529443
The importance of clarifying the goals of a cryptographic protocol is widely recognised. The majority of authors have addressed…
Expand