Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,190,209 papers from all fields of science
Search
Sign In
Create Free Account
Keygen
Known as:
Key gen
, Keygens
A key generator (key-gen) is a computer program that generates a product licensing key, such as a serial number, necessary to activate for use a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
Algorithm
Antivirus software
Astalavista.box.sk
Chiptune
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Experimental Evaluation to Enhance Security for Health Care System Using Cloud Computing and Near Field Communication
S. Sharma
2017
Corpus ID: 27841263
Developed countries and increasingly mature society of the need to develop smart call in many health care facilities to deliver…
Expand
2016
2016
Towards secure elements for the Internet of Things: The eLock use case: Work in progress — Invited paper
P. Urien
Second International Conference on Mobile and…
2016
Corpus ID: 25970566
Security and trust are major prerequisites for the deployment of Internet of Things (IoT) infrastructures. In this paper we…
Expand
2015
2015
SIPHER: Scalable Implementation of Primitives for Homomorphic Encryption
David Cousins
,
Kurt Rohloff
,
Christopher Peikert
,
Daniel Sumorok
2015
Corpus ID: 51854013
Abstract : The goal of SIPHER was to improve the efficiency and scalability of Fully Homomorphic Encryption (FHE). Significant…
Expand
2015
2015
Homomorphic Autocomplete
Gizem S. Çetin
,
Wei Dai
,
Yarkin Doröz
,
B. Sunar
IACR Cryptology ePrint Archive
2015
Corpus ID: 17864341
With the rapid progress in fully homomorpic encryption (FHE) and somewhat homomorphic encryption (SHE) schemes, we are witnessing…
Expand
2014
2014
Multiple-Replica Public Auditing Protocol for Cloud Storage
Hong Liu
,
Shu Lan Wang
,
Peng Zhang
2014
Corpus ID: 55749238
Cloud storage can provide a flexible on-demand data storage service to users anywhere and anytime. However, users data is owned…
Expand
2014
2014
An Ontology-Based Approach to Attribute Management in ABAC Environment
Prabhu Verleker
,
Ashwin Narayan
2014
Corpus ID: 62324264
Attribute Based Access Control (ABAC) mechanisms have been attracting a lot of interest from the research community in recent…
Expand
2012
2012
A lossless digital encryption system for multimedia using orthogonal transforms
M. V. Malakooti
,
Mojtaba Raeisi Nejad Dobuneh
Digital Information and Communication Technology…
2012
Corpus ID: 16420034
In this research work, we have developed a novel lossless digital encryption system for multimedia using the orthogonal…
Expand
2011
2011
Semantic Solutions to Program Analysis Problems
Sam Tobin-Hochstadt
,
David Van Horn
arXiv.org
2011
Corpus ID: 20264
Problems in program analysis can be solved by developing novel program semantics and deriving abstractions conventionally. For…
Expand
2010
2010
Lightweight key agreement with key chaining
P. Krier
,
Sai Seshabhattar
,
Jason L. Pereira
,
D. Engels
,
S. Nair
The 7th IEEE International Conference on Mobile…
2010
Corpus ID: 22160874
Small ad-hoc wireless networks are becoming ubiquitous. Wireless protocols like ZigBee, ANT, and Bluetooth have been targeted…
Expand
2000
2000
Elliptic Curve Cryptography on Smart Cards
H. Pietiläinen
2000
Corpus ID: 3003172
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE