Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,023,350 papers from all fields of science
Search
Sign In
Create Free Account
Key management
Known as:
Symmetric key management
, Key management (disambiguation)
, Key Management Solution
Expand
Key management is the management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Bell ID
Block cipher
Bring your own encryption
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Private key agreement and secure communication for heterogeneous sensor networks
S. Rahman
,
K. El-Khatib
J. Parallel Distributed Comput.
2010
Corpus ID: 35774587
2009
2009
Efficient migration for mobile computing in distributed networks
Kuo-Hsuan Huang
,
Y. Chung
,
Chia-Hui Liu
,
F. Lai
,
Tzer-Shyong Chen
Comput. Stand. Interfaces
2009
Corpus ID: 13174262
2009
2009
A routing protocol based on trusted and shortest path selection for mobile ad hoc network
Hothefa Sh.Jassim
,
S. Yussof
,
T. S. Kiong
,
S. Koh
,
Roslan Ismail
IEEE 9th Malaysia International Conference on…
2009
Corpus ID: 20409780
A mobile ad-hoc network (MANET) is a peer-to-peer wireless network where nodes can communicate with each other without the use of…
Expand
Highly Cited
2008
Highly Cited
2008
An Application-Oriented Framework for Wireless Sensor Network Key Establishment
K. Martin
,
Maura B. Paterson
WCAN@ICALP
2008
Corpus ID: 10546803
2007
2007
A Distributed Trust Establishment Scheme for Mobile Ad Hoc Networks
Jaydip Sen
,
Piyali Roy Chowdhury
,
I. Sengupta
International Conference on Computing: Theory and…
2007
Corpus ID: 2334500
Wireless ad hoc networks have generated much interest, both in research literature and the telecommunication industry. The…
Expand
2005
2005
Selective Image Encryption Using JBIG
Roman Pfarrhofer
,
A. Uhl
Communications and Multimedia Security
2005
Corpus ID: 1429680
Selective encryption techniques of JBIG encoded visual data are discussed. We are able to show attack resistance against common…
Expand
2005
2005
ChipLock: support for secure microarchitectures
Taeho Kgil
,
Laura Falk
,
T. Mudge
CARN
2005
Corpus ID: 9213563
The increasing need for security has caused system designers to consider placing some security support directly at the hardware…
Expand
Highly Cited
2004
Highly Cited
2004
Security for cluster based ad hoc networks
V. Varadharajan
,
R. Shankaran
,
M. Hitchens
Computer Communications
2004
Corpus ID: 34800257
2004
2004
Access control in a hierarchy using one-way hash functions
Cungang Yang
,
Celia Li
Computers & security
2004
Corpus ID: 17799208
2004
2004
Jigsaw-based secure data transfer over computer networks
R. Vasudevan
,
A. Abraham
,
S. Sanyal
,
D. Agrawal
International Conference on Information…
2004
Corpus ID: 7194636
In this paper, we present a novel encryption-less algorithm to enhance security in transmission of data in networks. The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE