Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,050 papers from all fields of science
Search
Sign In
Create Free Account
Public key fingerprint
Known as:
Public-key fingerprint
, Public key fingerprints
, Key fingerprints
Expand
In public-key cryptography, a public key fingerprint is a short sequence of bytes used to identify a longer public key. Fingerprints are created by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
Brute-force search
Collision attack
Cryptographic hash function
Cryptographically Generated Address
Expand
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Unsupervised Learning for Log Data Analysis Based on Behavior and Attribute Features
Xiaojuan Wang
,
Defu Wang
,
Yong Zhang
,
Lei Jin
,
Mei Song
Proceedings of the International Conference on…
2019
Corpus ID: 202675984
In some special application environments, network fault can lead to loss of important information or even mission failures…
Expand
2018
2018
Romanian Biometric Word List for Public Key Fingerprint Validation
Alin Anton
International Symposium on Applied Computational…
2018
Corpus ID: 52119552
Public key cryptography is widely used for exchanging secret passwords over insecure channels, for data provenance identification…
Expand
2017
2017
Secure data deduplication scheme based on distributed random key in integrated networks
Hui Qi
,
Yingjie Han
,
Xiaoqiang Di
,
Fang Sun
International Conference on Innovative Computing…
2017
Corpus ID: 4358836
With the progress in space technologies, the future integrated network incorporating ground internet and spatial network is…
Expand
2015
2015
Resonant Raman spectra of grades of human brain glioma tumors reveal the content of tryptophan by the 1588 cm-1 mode
Yan Zhou
,
Cheng-hui Liu
,
+8 authors
R. Alfano
Biomedical optics
2015
Corpus ID: 119707578
RR spectra of brain normal tissue, gliomas in low grade I and II, and malignant glioma tumors in grade III and IV were measured…
Expand
Review
2015
Review
2015
Optical biopsy - a new armamentarium to detect disease using light
Y. Pu
,
R. Alfano
Biomedical optics
2015
Corpus ID: 123106341
Optical spectroscopy has been considered a promising method for cancer detection for past thirty years because of its advantages…
Expand
2014
2014
Related-Key Security for Hybrid Encryption
Xianhui Lu
,
Bao Li
,
Dingding Jia
Information Security Conference
2014
Corpus ID: 27748031
We prove that, for a KEM/Tag-DEM (Key Encapsulation Mechanism/ Tag Data Encapsulation Mechanism) hybrid encryption scheme, if the…
Expand
2014
2014
CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication
Marcela S. Melara
,
Aaron Blankstein
,
Joseph Bonneau
,
M. Freedman
,
E. Felten
IACR Cryptology ePrint Archive
2014
Corpus ID: 4474218
Recent revelations about government surveillance have significantly increased the demand for end-to-end secure communications…
Expand
2012
2012
The research on the preprocessing algorithm for fingerprint image
Hailong Jia
,
Kun Cao
IEEE Symposium on Electrical & Electronics…
2012
Corpus ID: 23113830
As one of the key fingerprint identification technology, the fingerprint preprocessing algorithm consists of the segmentation…
Expand
2011
2011
An efficient approach to recognise fingerprints
M. S. Sadi
,
Abdul Ahad
,
Ariful Haque
14th International Conference on Computer and…
2011
Corpus ID: 18288097
Fingerprint analysis is typically based on the position and pattern of detected singular points in the fingerprint images. These…
Expand
1999
1999
Scanning apertureless microscopy below the diffraction limit: Comparisons between theory and experiment
C. Hill
,
P. Bridger
,
G. Picus
,
T. C. Mcgill
1999
Corpus ID: 369454
The exact nature of the signal in scanning apertureless microscopy techniques is the subject of much debate. We have sought to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE