Skip to search formSkip to main contentSkip to account menu

Public key fingerprint

Known as: Public-key fingerprint, Public key fingerprints, Key fingerprints 
In public-key cryptography, a public key fingerprint is a short sequence of bytes used to identify a longer public key. Fingerprints are created by… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
In some special application environments, network fault can lead to loss of important information or even mission failures… 
2018
2018
Public key cryptography is widely used for exchanging secret passwords over insecure channels, for data provenance identification… 
2017
2017
With the progress in space technologies, the future integrated network incorporating ground internet and spatial network is… 
2015
2015
RR spectra of brain normal tissue, gliomas in low grade I and II, and malignant glioma tumors in grade III and IV were measured… 
Review
2015
Review
2015
Optical spectroscopy has been considered a promising method for cancer detection for past thirty years because of its advantages… 
2014
2014
We prove that, for a KEM/Tag-DEM (Key Encapsulation Mechanism/ Tag Data Encapsulation Mechanism) hybrid encryption scheme, if the… 
2014
2014
Recent revelations about government surveillance have significantly increased the demand for end-to-end secure communications… 
2012
2012
As one of the key fingerprint identification technology, the fingerprint preprocessing algorithm consists of the segmentation… 
2011
2011
Fingerprint analysis is typically based on the position and pattern of detected singular points in the fingerprint images. These… 
1999
1999
The exact nature of the signal in scanning apertureless microscopy techniques is the subject of much debate. We have sought to…