Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,761 papers from all fields of science
Search
Sign In
Create Free Account
Keygen
Known as:
Key gen
, Keygens
A key generator (key-gen) is a computer program that generates a product licensing key, such as a serial number, necessary to activate for use a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
Algorithm
Antivirus software
Astalavista.box.sk
Chiptune
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Experimental Evaluation to Enhance Security for Health Care System Using Cloud Computing and Near Field Communication
S. Sharma
2017
Corpus ID: 27841263
Developed countries and increasingly mature society of the need to develop smart call in many health care facilities to deliver…
Expand
2016
2016
Towards secure elements for the Internet of Things: The eLock use case: Work in progress — Invited paper
P. Urien
Second International Conference on Mobile and…
2016
Corpus ID: 25970566
Security and trust are major prerequisites for the deployment of Internet of Things (IoT) infrastructures. In this paper we…
Expand
2015
2015
SIPHER: Scalable Implementation of Primitives for Homomorphic Encryption
David Cousins
,
Kurt Rohloff
,
Christopher Peikert
,
Daniel Sumorok
2015
Corpus ID: 51854013
Abstract : The goal of SIPHER was to improve the efficiency and scalability of Fully Homomorphic Encryption (FHE). Significant…
Expand
2015
2015
Homomorphic Autocomplete
Gizem S. Çetin
,
Wei Dai
,
Yarkin Doröz
,
B. Sunar
IACR Cryptology ePrint Archive
2015
Corpus ID: 17864341
With the rapid progress in fully homomorpic encryption (FHE) and somewhat homomorphic encryption (SHE) schemes, we are witnessing…
Expand
2014
2014
Multiple-Replica Public Auditing Protocol for Cloud Storage
Hong Liu
,
Shu Lan Wang
,
Peng Zhang
2014
Corpus ID: 55749238
Cloud storage can provide a flexible on-demand data storage service to users anywhere and anytime. However, users data is owned…
Expand
2014
2014
An Ontology-Based Approach to Attribute Management in ABAC Environment
Prabhu Verleker
,
Ashwin Narayan
2014
Corpus ID: 62324264
Attribute Based Access Control (ABAC) mechanisms have been attracting a lot of interest from the research community in recent…
Expand
2013
2013
A Stream Symmetric Homomorphic Encryption Scheme with Finite Automata
Alejandro Llamas
,
Raul Ernesto Gonzalez
2013
Corpus ID: 17468079
This paper presents a new homomorphic encryption scheme which uses sequential machines as a basis to produce a stream-symmetric…
Expand
2011
2011
Semantic Solutions to Program Analysis Problems
Sam Tobin-Hochstadt
,
David Van Horn
arXiv.org
2011
Corpus ID: 20264
Problems in program analysis can be solved by developing novel program semantics and deriving abstractions conventionally. For…
Expand
2007
2007
Cross-layer Mobility with SIP and MIPv6
R. Prior
,
S. Sargento
2007
Corpus ID: 17078199
Terminal mobility may be handled at different layers. Though the MIPv6 protocol is the strongest candidate for handling mobility…
Expand
2000
2000
Elliptic Curve Cryptography on Smart Cards
H. Pietiläinen
2000
Corpus ID: 3003172
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE