Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,489,399 papers from all fields of science
Search
Sign In
Create Free Account
Keychain
Known as:
Keychain Access
, Apple Keychain
, Keychain (Apple)
Expand
Keychain is password management system in OS X developed by Apple. It was introduced with Mac OS 8.6, and has been included in all subsequent…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
23 relations
"Classic" Mac OS
1Password
Dashlane
Disk image
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars
Lennert Wouters
,
Eduard Marin
,
T. Ashur
,
Benedikt Gierlichs
,
B. Preneel
IACR Trans. Cryptogr. Hardw. Embed. Syst.
2019
Corpus ID: 173992130
The security of immobiliser and Remote Keyless Entry systems has been extensively studied over many years. Passive Keyless Entry…
Expand
Highly Cited
2018
Highly Cited
2018
Hierarchical LSTM for Sign Language Translation
Dan Guo
,
Wen-gang Zhou
,
Houqiang Li
,
M. Wang
AAAI
2018
Corpus ID: 19178535
Continuous Sign Language Translation (SLT) is a challenging task due to its specific linguistics under sequential gesture…
Expand
2018
2018
“Key clip extraction for Quick Browsing from Surveillance Videos”
S. Mr.GuravSachin
,
M. Sudhir
2018
Corpus ID: 212517715
The video information is growing exponentially day by day. Surveillance videos generate hours of videos, the video uploaded on…
Expand
2018
2018
SlimIoT: Scalable Lightweight Attestation Protocol for the Internet of Things
Mahmoud Ammar
,
Mahdi Washha
,
G. Ramachandran
,
B. Crispo
IEEE Conference on Dependable and Secure…
2018
Corpus ID: 53718660
The Internet of Things (IoT) is increasingly intertwined with critical industrial processes, yet contemporary IoT devices offer…
Expand
2017
2017
Analysis of SEAndroid Policies: Combining MAC and DAC in Android
Haining Chen
,
Ninghui Li
,
William Enck
,
Yousra Aafer
,
X. Zhang
ACSAC
2017
Corpus ID: 20958200
Android has become a dominant computing platform, and its popularity has coincided with a surge of malware. The incorporation of…
Expand
2016
2016
Evaluating the security of one-way key chains in TESLA-based GNSS Navigation Message Authentication schemes
Gianluca Caparra
,
Silvia Sturaro
,
N. Laurenti
,
C. Wullems
International Conference on Localization and GNSS…
2016
Corpus ID: 25608237
In the proposals for Global Navigation Satellite Systems (GNSS) Navigation Message Authentication (NMA) that are based on…
Expand
2014
2014
Towards the era of wireless keys: How the IoT can change authentication paradigm
V. Petrov
,
Sviatoslav Edelev
,
Maria Komar
,
Y. Koucheryavy
IEEE World Forum on Internet of Things (WF-IoT)
2014
Corpus ID: 11019646
In this paper, a new paradigm of user authentication called “wireless key” is described. Following this concept, a novel many-to…
Expand
2012
2012
Long Duration Broadcast Authentication for Wireless Sensor Networks
Yongsheng Liu
,
Jie Li
,
M. Guo
IEEE 75th Vehicular Technology Conference (VTC…
2012
Corpus ID: 1310657
In the resource constrained Wireless Sensor Networks (WSNs), the broadcast authentication is widely fulfilled by the emerging…
Expand
Highly Cited
2004
Highly Cited
2004
Fuzzy points of equivalent fuzzy subsets
V. Murali
Inf. Sci.
2004
Corpus ID: 14475563
2004
2004
Storage-Efficient Stateless Group Key Revocation
Pan Wang
,
P. Ning
,
D. Reeves
ISC
2004
Corpus ID: 14396757
Secure group communication relies on secure and robust distribution of group keys. A stateless group key distribution scheme is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE