Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Key management

Known as: Symmetric key management, Key management (disambiguation), Key Management Solution 
Key management is the management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, and… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Abstract Blockchain has a range of built-in features, such as distributed ledger, decentralized storage, authentication, security… Expand
Review
2019
Review
2019
The third generation partnership project released its first 5G security specifications in March 2018. This paper reviews the… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Highly Cited
2014
Highly Cited
2014
Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Highly Cited
2009
Highly Cited
2009
Hierarchies arise in the context of access control whenever the user population can be modeled as a set of partially ordered… Expand
  • figure 1
Highly Cited
2007
Highly Cited
2007
Abstract Security is critical for sensor networks used in military, homeland security and other hostile environments. Previous… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2006
Highly Cited
2006
This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Highly Cited
2005
Highly Cited
2005
In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of infrastructure, providing secure… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2004
Highly Cited
2004
To achieve security in wireless sensor networks, it is important to he able to encrypt messages sent among sensor nodes. Keys for… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2003
Highly Cited
2003
In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Highly Cited
1999
Highly Cited
1999
This report contains a discussion of the difficult problem of key management for multicast communication sessions. It focuses on… Expand