Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,291,192 papers from all fields of science
Search
Sign In
Create Free Account
Keyring (cryptography)
In cryptography, a keyring stores known encryption keys (and, in some cases, passwords). For example, GNU Privacy Guard makes use of keyrings.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Cryptography
Features new to Windows XP
GNU Privacy Guard
Linux PAM
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Deploying and Testing IKEv2, Flex VPN and GET VPN
Arun Katuwal
2018
Corpus ID: 115873260
2016
2016
Learning from our keyring: What do our PGP keys say about the project?
G. Wolf
2016
Corpus ID: 114451218
Since the keyring-maint team started aggresively pushing for the retirement of short, obsoleted PGP keys two years ago, I started…
Expand
2015
2015
A portable device for intercepting and retransmission of infrared modulated signals
Costel Cherciu
,
Claudiu Ionut Cherciu
,
D. Năstac
International Symposium for Design and Technology…
2015
Corpus ID: 21090534
Infrared modulated signals are widely used in remote controls of common household appliances, as well as in business and public…
Expand
2014
2014
Dynamic Multipoint VPN Configuration Guide, Cisco IOS XE Release 3S
Americas Headquarters
2014
Corpus ID: 63154027
2014
2014
Shake Hands to Bedevil: Securing Email with Wearable Technology
Arne Renkema-Padmos
,
Jerome Baum
,
M. Volkamer
,
K. Renaud
International Symposium on Human Aspects of…
2014
Corpus ID: 5725735
Emailers seldom encrypt, sometimes because they do not see the need to do this, and sometimes because they do not know how to or…
Expand
2013
2013
A Framework for Extended Acquisition and Uniform Representation of Forensic Email Evidence
Justin Paglierani
2013
Corpus ID: 56633297
The digital forensics community has neglected email forensics as a process, despite the fact that email remains an important tool…
Expand
2012
2012
MAVE, NEW LIGHTWEIGHT DIGITAL SIGNATURE PROTOCOLS FOR MASSIVE VERIFICATIONS
Sergio Demián
2012
Corpus ID: 42293000
In this paper we propose new decentralized digital signature protocols to allow massive bulk verifications (MAVE). The protocols…
Expand
2012
2012
Live Forensics – Extracting Credentials on Windows and Linux Systems
Liviu Itoafa
2012
Corpus ID: 55483828
’Post-mortem’ analysis of a system can be greatly simplified if the correct information is gathered in the live analysis stage…
Expand
2009
2009
The first ever Northern Territory homelands/ outstations policy
Seán Kerins
2009
Corpus ID: 155774359
1965
1965
Combined keyring and flashlight
S. Schwartz
1965
Corpus ID: 195040011
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE