Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,536,296 papers from all fields of science
Search
Sign In
Create Free Account
Key management
Known as:
Symmetric key management
, Key management (disambiguation)
, Key Management Solution
Expand
Key management is the management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Bell ID
Block cipher
Bring your own encryption
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Security of mobile agent in ad hoc network using threshold cryptography
S. Rizvi
,
Zinat Sultana
,
Bo Sun
,
Washiqul Islam
2010
Corpus ID: 32321735
In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main…
Expand
2010
2010
A New Private Data Aggregation Scheme for Wireless Sensor Networks
Rabindra Bista
,
Hee-Dae Kim
,
Jae-Woo Chang
10th IEEE International Conference on Computer…
2010
Corpus ID: 15576492
Many wireless sensor network (WSN) applications require privacy of the sampled data during transmission from the source nodes to…
Expand
2009
2009
Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication
A. Prakash
,
V. Uthariaraj
First International Conference on Networks…
2009
Corpus ID: 14584993
Multicast communication in dynamic environments like grids and ad hoc networks are potentially of critical concern. As group…
Expand
2007
2007
A Distributed Trust Establishment Scheme for Mobile Ad Hoc Networks
Jaydip Sen
,
Piyali Roy Chowdhury
,
I. Sengupta
International Conference on Computing: Theory and…
2007
Corpus ID: 2334500
Wireless ad hoc networks have generated much interest, both in research literature and the telecommunication industry. The…
Expand
2005
2005
Selective Image Encryption Using JBIG
Roman Pfarrhofer
,
A. Uhl
Communications and Multimedia Security
2005
Corpus ID: 1429680
Selective encryption techniques of JBIG encoded visual data are discussed. We are able to show attack resistance against common…
Expand
2004
2004
Secret sharing with access structures in a hierarchy
Chinchen Chang
,
Chu-Hsing Lin
,
Wei Lee
,
Pai-Cheng Hwang
18th International Conference on Advanced…
2004
Corpus ID: 5909608
We propose a secret sharing scheme with the property of access structures in a hierarchy. We employ the concept of admission…
Expand
2004
2004
Jigsaw-based secure data transfer over computer networks
R. Vasudevan
,
A. Abraham
,
S. Sanyal
,
D. Agrawal
International Conference on Information…
2004
Corpus ID: 7194636
In this paper, we present a novel encryption-less algorithm to enhance security in transmission of data in networks. The…
Expand
Highly Cited
2004
Highly Cited
2004
SAKM: a scalable and adaptive key management approach for multicast communications
Y. Challal
,
H. Bettahar
,
A. Bouabdallah
CCRV
2004
Corpus ID: 16771834
Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In…
Expand
2001
2001
A cooperative file system
F. Dabek
2001
Corpus ID: 61789894
1995
1995
On Paradigms for Security Policies in Multipolicy Environments
Winfried E. Kiihnhauser
1995
Corpus ID: 17011322
For many years the traditional concept of the reference monitor has proven to be a sound architectural foundation for secure…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE