Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,712,488 papers from all fields of science
Search
Sign In
Create Free Account
Key management
Known as:
Symmetric key management
, Key management (disambiguation)
, Key Management Solution
Expand
Key management is the management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Bell ID
Block cipher
Bring your own encryption
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
DIaaS: Data Integrity as a Service in the Cloud
S. Nepal
,
Shiping Chen
,
Jinhui Yao
,
Danan Thilakanathan
IEEE International Conference on Cloud Computing
2011
Corpus ID: 14581975
In this paper, we propose a secure cloud storage service architecture with the focus on Data Integrity as a Service (DIaaS) based…
Expand
Highly Cited
2010
Highly Cited
2010
Private key agreement and secure communication for heterogeneous sensor networks
S. Rahman
,
K. El-Khatib
J. Parallel Distributed Comput.
2010
Corpus ID: 35774587
Highly Cited
2010
Highly Cited
2010
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
Peng Li
,
Xin Yang
,
Kai Cao
,
Xunqiang Tao
,
Ruifang Wang
,
Jie Tian
Journal of Network and Computer Applications
2010
Corpus ID: 18632015
Highly Cited
2008
Highly Cited
2008
Group Key Management in MANETs
M. Bouassida
,
Isabelle Chrisment
,
O. Festor
International Journal of Network Security
2008
Corpus ID: 8717254
Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most…
Expand
Review
2008
Review
2008
A theoretical and experimental study of geometric networks
Mohammad Farshi
2008
Corpus ID: 267152010
• A submitted manuscript is the author's version of the article upon submission and before peer-review. There can be important…
Expand
Highly Cited
2004
Highly Cited
2004
Nortel Networks
2004
Corpus ID: 18433595
Review
2004
Review
2004
Introduction to UDDI: Important Features and Functional Concepts
2004
Corpus ID: 15722623
OVERVIEW The Universal Description, Discovery, and Integration () protocol is a central element of the group of related…
Expand
Highly Cited
2004
Highly Cited
2004
Security for cluster based ad hoc networks
V. Varadharajan
,
R. Shankaran
,
M. Hitchens
Computer Communications
2004
Corpus ID: 34800257
Highly Cited
1999
Highly Cited
1999
Internet security architecture
R. Molva
Comput. Networks
1999
Corpus ID: 1426559
Highly Cited
1988
Highly Cited
1988
Key storage in secure networks
C. Mitchell
,
F. Piper
Discrete Applied Mathematics
1988
Corpus ID: 17674805
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE