Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,065,677 papers from all fields of science
Search
Sign In
Create Free Account
Key server (cryptographic)
Known as:
HKP
, Key server
, OpenPGP HTTP Keyserver Protocol
In computer security, a key server is a computer that receives and then serves existing cryptographic keys to users or other programs. The users…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Brian LaMacchia
Chain of trust
Computer security
Cypherpunk
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
An Efficient PGP Keyserver without Prior Context
Count Values Hashes
2017
Corpus ID: 8857667
This paper describes the implementation of a synchronizing PGP key server based on a simple and efficient set reconciliation…
Expand
2012
2012
Balanced key tree management for multi-privileged groups using (N, T) policy
M. Angamuthu
,
A. Ramalingam
Secur. Commun. Networks
2012
Corpus ID: 31622062
Many internet applications are based on group communication model. For secure group communication scenario, key management is an…
Expand
2011
2011
Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean Algorithm
A. Peinado
,
A. Ortiz
Computational Intelligence in Security for…
2011
Corpus ID: 984662
Recently, Naranjo, Lopez-Ramos and Casado have proposed a key refreshment for multicast schemes based on the extended Euclidean…
Expand
2010
2010
Key Sharing in Hierarchical Wireless Sensor Networks
Ya-nan Liu
,
Jian Wang
,
He Du
,
L. Zhang
IEEE/IFIP International Conference on Embedded…
2010
Corpus ID: 7036541
Hierarchical wireless sensor networks (HSNs) have been widely used in many applications, especially in military areas. They…
Expand
2010
2010
Cryptopometry as a Methodology for Investigating Encrypted Material
N. McGrath
,
P. Gladyshev
,
J. Carthy
International Journal of Digital Crime and…
2010
Corpus ID: 7802030
When encrypted material is discovered during a digital investigation and the investigator cannot decrypt the material then he or…
Expand
2007
2007
The Coming Wave of Multithreaded Chip Multiprocessors
J. Laudon
,
Lawrence Spracklen
International journal of parallel programming
2007
Corpus ID: 708482
The performance of microprocessors has increased exponentially for over 35 years. However, process technology challenges, chip…
Expand
2004
2004
Reliable group rekeying with a customer perspective
Melek Önen
,
R. Molva
IEEE Global Telecommunications Conference…
2004
Corpus ID: 18553181
Even though group rekeying is one of the most visited areas in network security, solutions still are severely lacking with…
Expand
2003
2003
Group rekeying with limited unicast recovery
Brian Zhang
,
S. Lam
,
Dong-Young Lee
IEEE International Conference on Communications…
2003
Corpus ID: 1699171
In secure group communications, a key server can deliver a group-oriented rekey message [Chung Kei Wong et al., 1998] to a large…
Expand
2001
2001
Advanced multimedia security solutions for data and owner authentication
J. Dittmann
,
M. Steinebach
,
Lucilla Croce Ferri
,
Astrid Mayerhoefer
,
C. Vielhauer
Optics + Photonics
2001
Corpus ID: 60511563
In this paper we introduce a new content-fragile watermarking concept for multimedia data authentication, especially for a/v data…
Expand
Review
1998
Review
1998
Intrusion Detection Product Evaluation Criteria
S. Lodin
1998
Corpus ID: 61104832
Intrusion detection systems (also known as ID systems or IDS for short) are one of the latest security tools in the battle…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE