Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,190,169 papers from all fields of science
Search
Sign In
Create Free Account
NSAKEY
Known as:
KEY2
, NSA key
In computer security and cryptography, _NSAKEY was a variable name discovered in Windows NT 4 Service Pack 5 (which had been released unstripped of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Computer security
Computers, Freedom and Privacy Conference
Criticism of Microsoft Windows
Cryptographic Service Provider
Expand
Broader (1)
History of cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Genetic-based Key Splitting Algorithm for the Two Layered Protection Scheme
O. Banimelhem
,
Hiba Al-Dahoud
,
E. Taqieddin
,
M. Mowafi
International Conference on Information…
2019
Corpus ID: 201622877
Database as a service is one of the important services provided by Cloud Computing. Recently, a Two Layered Protection Scheme for…
Expand
2014
2014
Achieving MANETs Security by Exchanging Path Oriented Keys and Priority Based Secured Route Discovery
N. Chandrakant
2014
Corpus ID: 55104407
In this work, two scenarios are considered, scenario-1 is key based communication and scenario-2 is priority based routing and…
Expand
2013
2013
Exchanging Path Oriented N-Generated Keys Via Alternative Path for Secured Communication in MANETs
N. Chandrakant
2013
Corpus ID: 62416105
In this paper, communication in a MANET works on key sharing called KEY1 and KEY2 to establish link between nodes. Here source…
Expand
2012
2012
Robust track-and-trace video watermarking
Lei Yang
,
Qian Chen
,
Jun Tian
,
D. Wu
Secur. Commun. Networks
2012
Corpus ID: 6510772
With the development of computers and the Internet, digital multimedia can be distributed and pirated easily. Watermarking is a…
Expand
2012
2012
Steganography based on Adaptive Embedding of Encrypted Payload in Wavelet domain
Nedal Kafri
,
Elham Ghasemi
,
Yong Zhang
2012
Corpus ID: 212553039
— Steganography is the method of hiding the secrete message in a cover object for covert communication. In this paper we propose…
Expand
2011
2011
The characteristics of rain in the raining seasons in Guangdong province and its relationship with sea surface temperature(SST)
Jian-Hwa Hu
,
W. Bao
International Conference on Electrical and…
2011
Corpus ID: 36920820
The article analyzes the characteristics of precipitation in the first and the second raining seasons in Guangdong province, and…
Expand
2009
2009
Breaking KeeLoq in a Flash ⋆ -
Markus Kasper
,
Timo Kasper
,
A. Moradi
,
C. Paar
2009
Corpus ID: 15676759
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the…
Expand
2006
2006
Procede d'exploitation d'une ligne ferroviaire
Olaf Richter
,
Gunther Wahl
2006
Corpus ID: 194770208
L'invention concerne un procede et un systeme permettant d'exploiter une ligne ferroviaire. Selon ledit procede, un poste de…
Expand
1999
1999
A Study on Personal Color in Relation with Well-matched Color and Preferred Color
Heesun Oh
1999
Corpus ID: 142420455
This study is to examine personal color - preferred color, well-matched color and the relations between preferred color and the…
Expand
1955
1955
Anaerobic Metabolism of Thiocyanate by Thiobacilli
J. P. Walt
,
C. D. D. Kruyff
Nature
1955
Corpus ID: 204991324
IN 1904, Beijerinck1 first described the decomposition of ammonium thiocyanate by Thiobacilli. Thirty-three years later, Happold…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE