Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Key management

Known as: Symmetric key management, Key management (disambiguation), Key Management Solution 
Key management is the management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, and… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Hierarchies arise in the context of access control whenever the user population can be modeled as a set of partially ordered… Expand
  • figure 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Abstract Security is critical for sensor networks used in military, homeland security and other hostile environments. Previous… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Numerous key management schemes have been proposed for sensor networks. The objective of key management is to dynamically… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
To achieve security in wireless sensor networks, it is important to he able to encrypt messages sent among sensor nodes. Keys for… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Secure and reliable group communication is an active area of research. Its popularity is fueled by the growing importance of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure… Expand
  • figure 1
Is this relevant?
Highly Cited
1999
Highly Cited
1999
This report contains a discussion of the difficult problem of key management for multicast communication sessions. It focuses on… Expand
Is this relevant?