Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,466 papers from all fields of science
Search
Sign In
Create Free Account
Key generation
Key generation is the process of generating keys in cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted. A…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
128-bit
Algorithm
CDMF
Certificate policy
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Time efficient secure DNA based access control model for cloud computing environment
Suyel Namasudra
,
Pinki Roy
,
P. Vijayakumar
,
S. Audithan
,
B. Balusamy
Future generations computer systems
2017
Corpus ID: 7398981
2017
2017
Cognitive Keys in Personalized Cryptography
M. Ogiela
,
L. Ogiela
International Conference on Advanced Information…
2017
Corpus ID: 13099707
In this paper will be described a new way of using cognitive approaches in personalized cryptography algorithms. Personal…
Expand
2016
2016
A Robust and Reusable ECG-Based Authentication and Data Encryption Scheme for eHealth Systems
Pei Huang
,
Borui Li
,
Linke Guo
,
Zhanpeng Jin
,
Yu Chen
Global Communications Conference
2016
Corpus ID: 42742382
eHealth systems generate from the integration of information and communication technologies with traditional healthcare systems…
Expand
2014
2014
Attribute Based Group Key Management
Mohamed Nabeel
,
E. Bertino
Transactions on Data Privacy
2014
Corpus ID: 659378
Attribute based systems enable fine-grained access control among a group of users each identified by a set of attributes. Secure…
Expand
2012
2012
Decorrelating secret bit extraction via channel hopping in body area networks
Linjia Yao
,
S. Ali
,
V. Sivaraman
,
D. Ostry
IEEE International Symposium on Personal, Indoor…
2012
Corpus ID: 14780642
Recent research has demonstrated that two communicating parties can generate shared secret keys by exploiting characteristics of…
Expand
2010
2010
Diffie-Hellman key based authentication in proxy mobile IPv6
Hyungon Kim
,
Jong‐Hyouk Lee
Mobile Information Systems
2010
Corpus ID: 8175956
Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP…
Expand
2010
2010
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
M. Nikooghadam
,
A. Zakerolhosseini
,
M. Moghaddam
Journal of Systems and Software
2010
Corpus ID: 41893066
2009
2009
Application of Biometrics to Obtain High Entropy Cryptographic Keys
S. Kanade
,
D. Camara
,
D. Petrovska-Delacrétaz
,
B. Dorizzi
2009
Corpus ID: 10561184
—In this paper, a two factor scheme is proposed to generate cryptographic keys directly from biometric data, which unlike…
Expand
2009
2009
Efficient migration for mobile computing in distributed networks
Kuo-Hsuan Huang
,
Y. Chung
,
Chia-Hui Liu
,
F. Lai
,
Tzer-Shyong Chen
Comput. Stand. Interfaces
2009
Corpus ID: 13174262
2004
2004
State based key hop protocol: a lightweight security protocol for wireless networks
S. Michell
,
K. Srinivasan
ACM International Workshop on Performance…
2004
Corpus ID: 16685963
State Based Key Hop (SBKH) protocol provides a strong, lightweight encryption scheme for battery operated devices, such as the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE