Key server (cryptographic)

Known as: HKP, Key server, OpenPGP HTTP Keyserver Protocol 
In computer security, a key server is a computer that receives and then serves existing cryptographic keys to users or other programs. The users… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Large-scale cloud storage systems often attempt to achieve two seemingly conflicting goals: (1) the systems need to reduce the… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Cloud storage service providers such as Dropbox, Mozy, and others perform deduplication to save space by only storing one copy of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Fake antivirus (AV) programs have been utilized to defraud millions of computer users into paying as much as one hundred dollars… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In this paper, we present two new centralized group key management protocols based on the Chinese Remainder Theorem (CRT). By… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
With the advent of dual-core chips in the marketplace, small-scale CMP (chip multiprocessor) architectures are becoming… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
A prerequisite for secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2003
2003
Perfect Secrecy can only be achieved in multicast groups by ciphering data sent to the group with a different key every time a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive… (More)
  • figure 1
  • table 1
  • figure 3
  • figure 2
  • figure 5
Is this relevant?
Highly Cited
1992
Highly Cited
1992
Services provided on wide-area networks like the Internet present several challenges. The reliability, performance, and… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?