Key server

Known as: OpenPGP HTTP Keyserver Protocol 
In computer security, a key server is a computer that receives and then serves existing cryptographic keys to users or other programs. The users… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1983-2017
0519832017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Many emerging network applications are based upon a group communication model. In a peer-to-peer or ad-hoc network which do not… (More)
Is this relevant?
2009
2009
A group key distribution scheme based on static key tree structure and the Chinese Remainder Theorem (KTCRT-GKD) is proposed. It… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2008
2008
With the growth of internet, many network applications are relied on group communication model. To provide confidentiality for… (More)
  • table I
  • table II
  • table III
Is this relevant?
2007
2007
In this paper, we present two new centralized group key management protocols based on the Chinese Remainder Theorem (CRT). By… (More)
Is this relevant?
2007
2007
In this paper, we present a new group key management protocol based on the Chinese Remainder Theorem (CRT), which is developed… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 7
Is this relevant?
2002
2002
We consider several distributed collaborative key agreement protocols for dynamic peer groups. This problem has several important… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
In secure group communications, users of a group share a common group key. A key server sends the group key to authorized new… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive… (More)
  • figure 1
  • table 1
  • figure 3
  • figure 2
  • figure 5
Is this relevant?
Highly Cited
1984
Highly Cited
1984
I t is sometimes required t h a t user pairs in a network share secret information t o be used fo r mutual identification or as a… (More)
  • figure 1
Is this relevant?