Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,678,424 papers from all fields of science
Search
Sign In
Create Free Account
Session key
A session key is a single-use symmetric key used for encrypting all messages in one communication session. A closely related term is content…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
Authenticated Key Exchange
Crypto phone
FEA-M
GNU Privacy Guard
Expand
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
A novel user authentication scheme with anonymity for wireless communications
J. Niu
,
Xiong Li
Secur. Commun. Networks
2014
Corpus ID: 4040452
User authentication and privacy protection are important issues for wireless and mobile communication systems such as GSM, 3G…
Expand
Highly Cited
2011
Highly Cited
2011
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
Chun-Ta Li
,
M. Hwang
Information Sciences
2011
Corpus ID: 11133949
2010
2010
A cocktail protocol with the Authentication and Key Agreement on the UMTS
Hsia-Hung Ou
,
M. Hwang
,
J. Jan
Journal of Systems and Software
2010
Corpus ID: 5167493
2009
2009
A design of security protocol using hybrid encryption technique (AES-Rijndael and RSA)
E. Ramaraj
,
S. Karthikeyan
,
M. Hemalatha
2009
Corpus ID: 64879392
This paper aims to design the new security protocol using hybrid encryption technique for on line transaction. The hybrid…
Expand
2008
2008
A Secure Remote User Authentication Scheme with Smart Cards
Manoj Kumar
IACR Cryptology ePrint Archive
2008
Corpus ID: 8998539
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret…
Expand
Highly Cited
2006
Highly Cited
2006
An efficient and complete remote user authentication scheme using smart cards
H. Liaw
,
Jiann-Fu Lin
,
Wei-Chen Wu
Mathematical and computer modelling
2006
Corpus ID: 32935158
Highly Cited
2005
Highly Cited
2005
Efficient verifier-based key agreement protocol for three parties without server's public key
Sung-Woon Lee
,
Hyun-Sung Kim
,
K. Yoo
Applied Mathematics and Computation
2005
Corpus ID: 42426863
Highly Cited
2004
Highly Cited
2004
Efficient password authenticated key agreement using smart cards
Wen-Shenq Juang
Computers & security
2004
Corpus ID: 11579889
Review
2003
Review
2003
What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis
C. Meadows
European Symposium on Programming
2003
Corpus ID: 9712767
Much attention has been paid to the design of languages for the specification of cryptographic protocols. However, the ability to…
Expand
2000
2000
Protocol-independent secrecy
J. Millen
,
H. Ruess
Proceeding IEEE Symposium on Security and…
2000
Corpus ID: 2048891
Inductive proofs of secrecy invariants for cryptographic protocols can be facilitated by separating the protocol dependent part…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE