Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,521,575 papers from all fields of science
Search
Sign In
Create Free Account
Key management
Known as:
Symmetric key management
, Key management (disambiguation)
, Key Management Solution
Expand
Key management is the management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Bell ID
Block cipher
Bring your own encryption
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Exploring the Security Vulnerabilities of LoRa
Emekcan Aras
,
G. Ramachandran
,
Piers W. Lawrence
,
D. Hughes
3rd IEEE International Conference on Cybernetics…
2017
Corpus ID: 21904545
Internet-of-Things (IoT) deployments increasingly incorporate long range communication technologies. To support this transition…
Expand
Highly Cited
2015
Highly Cited
2015
Effective Key Management in Dynamic Wireless Sensor Networks
Seung-Hyun Seo
,
Jongho Won
,
Salmin Sultana
,
E. Bertino
IEEE Transactions on Information Forensics and…
2015
Corpus ID: 2201941
Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and…
Expand
Highly Cited
2014
Highly Cited
2014
SKM: Scalable Key Management for Advanced Metering Infrastructure in Smart Grids
Z. Wan
,
Guilin Wang
,
Yanjiang Yang
,
Shenxing Shi
IEEE transactions on industrial electronics…
2014
Corpus ID: 12852435
Advanced metering infrastructure (AMI) plays a critical role in the smart grid. It enables intelligent applications such as load…
Expand
Highly Cited
2014
Highly Cited
2014
OSCAR: Object security architecture for the Internet of Things
Mališa Vučinić
,
B. Tourancheau
,
F. Rousseau
,
A. Duda
,
Laurent Damon
,
R. Guizzetti
Proceeding of IEEE International Symposium on a…
2014
Corpus ID: 13899618
Highly Cited
2007
Highly Cited
2007
Chinese remainder theorem based group key management
Xinliang Zheng
,
Chin-Tser Huang
,
M. Matthews
ACM-SE 45
2007
Corpus ID: 5515890
In this paper, we present two new centralized group key management protocols based on the Chinese Remainder Theorem (CRT). By…
Expand
Review
2006
Review
2006
Multimedia Security Technologies for Digital Rights Management
Wenjun Zeng
,
Heather H. Yu
,
Ching-Yung Lin
2006
Corpus ID: 59735037
Highly Cited
2005
Highly Cited
2005
State of the art in ultra-low power public key cryptography for wireless sensor networks
G. Gaubatz
,
J. Kaps
,
Erdinç Öztürk
,
B. Sunar
Third IEEE International Conference on Pervasive…
2005
Corpus ID: 15014856
Security in wireless sensor networks is currently provided exclusively through symmetric key cryptography. In this paper we show…
Expand
Highly Cited
2003
Highly Cited
2003
Lightweight Authentication Protocols for Low-Cost RFID Tags
I. Vajda
2003
Corpus ID: 2163828
Providing security in low-cost RFID tags is a challenging task because tags are highly resource constrained and cannot support…
Expand
Highly Cited
1996
Highly Cited
1996
Accountability in Electronic Commerce Protocols
R. Kailar
IEEE Trans. Software Eng.
1996
Corpus ID: 12271238
In most commercial and legal transactions, the ability to hold individuals or organizations accountable for transactions is…
Expand
Highly Cited
1994
Highly Cited
1994
A 177 Mb/s VLSI implementation of the International Data Encryption Algorithm
R. Zimmermann
,
A. Curiger
,
H. Bonnenberg
,
H. Kaeslin
,
N. Felber
,
W. Fichtner
IEEE J. Solid State Circuits
1994
Corpus ID: 16042602
A VLSI implementation of the International Data Encryption Algorithm is presented. Security considerations led to novel system…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE