Key management

Known as: Key Management Solution, Key management protocol, Symmetric Key Management 
Key management is the management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, and… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1976-2017
020040019762017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2006
Highly Cited
2006
Recent advances in wireless sensor networks (WSNs) are fueling the interest in their application in a wide variety of sensitive… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Numerous key management schemes have been proposed for sensor networks. The objective of key management is to dynamically… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Hierarchies arise in the context of access control whenever the user population can be modeled as a set of partially ordered… (More)
  • figure 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
To achieve security in wireless sensor networks, it is important to he able to encrypt messages sent among sensor nodes. Keys for… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes with limited computation and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
No secure network file system has ever grown to span the Internet. Existing systems all lack adequate key management for security… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive… (More)
  • figure 1
  • table 1
  • figure 3
  • figure 2
  • figure 5
Is this relevant?
Highly Cited
1998
Highly Cited
1998
  • Marcel Waldvogely, Germano Caronniz, Dan Suny, Nathalie Weilery, Bernhard Plattnery
  • 1998
Middleware supporting secure applications in a distributed environment faces several challenges. Scalable security in the context… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?