Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,933,249 papers from all fields of science
Search
Sign In
Create Free Account
Session key
A session key is a single-use symmetric key used for encrypting all messages in one communication session. A closely related term is content…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
Authenticated Key Exchange
Crypto phone
FEA-M
GNU Privacy Guard
Expand
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Security improvement on an anonymous key agreement protocol based on chaotic maps
Kaiping Xue
,
P. Hong
2012
Corpus ID: 62596927
Highly Cited
2011
Highly Cited
2011
An anonymous key agreement protocol based on chaotic maps
Yujun Niu
,
Xing-yuan Wang
2011
Corpus ID: 62156763
Highly Cited
2011
Highly Cited
2011
Security enhancement on an improvement on two remote user authentication schemes using smart cards
Tien-Ho Chen
,
Han-Cheng Hsiang
,
W. Shih
Future generations computer systems
2011
Corpus ID: 36570629
Highly Cited
2011
Highly Cited
2011
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
Chun-Ta Li
,
M. Hwang
Information Sciences
2011
Corpus ID: 11133949
Highly Cited
2011
Highly Cited
2011
A communication-efficient three-party password authenticated key exchange protocol
T. Chang
,
M. Hwang
,
Wei-Pang Yang
Information Sciences
2011
Corpus ID: 18628913
Highly Cited
2010
Highly Cited
2010
DoS-resistant ID-based password authentication scheme using smart cards
M. Hwang
,
Song-Kong Chong
,
Te-Yu Chen
Journal of Systems and Software
2010
Corpus ID: 26309161
Highly Cited
2008
Highly Cited
2008
Group Key Management in MANETs
M. Bouassida
,
Isabelle Chrisment
,
O. Festor
International Journal of Network Security
2008
Corpus ID: 8717254
Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most…
Expand
Highly Cited
2007
Highly Cited
2007
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement
J. Byun
,
Dong Hoon Lee
,
J. Lim
Information Sciences
2007
Corpus ID: 15592867
Highly Cited
2004
Highly Cited
2004
Efficient password authenticated key agreement using smart cards
Wen-Shenq Juang
Computers & security
2004
Corpus ID: 11579889
Highly Cited
2002
Highly Cited
2002
Routing through the mist: privacy preserving communication in ubiquitous computing environments
J. Al-Muhtadi
,
R. Campbell
,
Apu Kapadia
,
M. D. Mickunas
,
Seung Yi
Proceedings 22nd International Conference on…
2002
Corpus ID: 2648878
Ubiquitous computing is poised to revolutionize the way we compute and interact with each other. However, unless privacy concerns…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE