Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,259,335 papers from all fields of science
Search
Sign In
Create Free Account
Key management
Known as:
Symmetric key management
, Key management (disambiguation)
, Key Management Solution
Expand
Key management is the management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Bell ID
Block cipher
Bring your own encryption
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2011
Review
2011
A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks
K. Manikandan
2011
Corpus ID: 13926377
A Mobile Ad hoc Network (MANET) is a dynamic wireless network that can be formed infrastructure less connections in which each…
Expand
Highly Cited
2010
Highly Cited
2010
Private key agreement and secure communication for heterogeneous sensor networks
S. Rahman
,
K. El-Khatib
J. Parallel Distributed Comput.
2010
Corpus ID: 35774587
Highly Cited
2010
Highly Cited
2010
A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography
M. Eldefrawy
,
M. Khan
,
K. Alghathbar
International Conference on Anti-counterfeiting…
2010
Corpus ID: 17448196
Achieving key agreement in wireless sensor networks (WSN) is a very hard problem. Many key agreement schemes come with a shortage…
Expand
2009
2009
Efficient migration for mobile computing in distributed networks
Kuo-Hsuan Huang
,
Y. Chung
,
Chia-Hui Liu
,
F. Lai
,
Tzer-Shyong Chen
Comput. Stand. Interfaces
2009
Corpus ID: 13174262
Highly Cited
2008
Highly Cited
2008
An Application-Oriented Framework for Wireless Sensor Network Key Establishment
K. Martin
,
Maura B. Paterson
WCAN@ICALP
2008
Corpus ID: 10546803
2005
2005
ChipLock: support for secure microarchitectures
Taeho Kgil
,
Laura Falk
,
T. Mudge
CARN
2005
Corpus ID: 9213563
The increasing need for security has caused system designers to consider placing some security support directly at the hardware…
Expand
Highly Cited
2004
Highly Cited
2004
Security for cluster based ad hoc networks
V. Varadharajan
,
R. Shankaran
,
M. Hitchens
Computer Communications
2004
Corpus ID: 34800257
2004
2004
Access control in a hierarchy using one-way hash functions
Cungang Yang
,
Celia Li
Computers & security
2004
Corpus ID: 17799208
2001
2001
A cooperative file system
F. Dabek
2001
Corpus ID: 61789894
Review
1998
Review
1998
Textbook of Women's Health
Marilyn M. Schapira
Annals of Internal Medicine
1998
Corpus ID: 53091146
Textbook of Women's Health; Wallis LA; ed. 1044 pages. Philadelphia: Lippincott-Raven; 1997. $99.50. Order phone 800-777-2295…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE