Session key

A session key is a single-use symmetric key used for encrypting all messages in one communication session. A closely related term is content… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2007
Highly Cited
2007
Three-party authenticated key exchange protocol is an important cryptographic technique in the secure communication areas, by… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In recent years, a large number of identity- based key agreement protocols from pairings have been proposed. Some of them are… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
The security of key agreement protocols has traditionally been notoriously hard to establish. In this paper we present a modular… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Schemes for encrypted key exchange are designed to provide two entities communicating over a public network, and sharing a (short… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
The security of sensor network s is ever more important nowadays. In this paper we propose a new protocol BROSK to construct link… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
In this paper, we describe a novel approach to scalable group re-keying for secure multicast. Our approach, which we call Kronos… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
A new formal security model for session key exchange protocols in the public key setting is proposed, and several eecient… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
In this paper, we investigate a method by which smart cards can be used to enhance the security of session key distribution in… (More)
Is this relevant?
Highly Cited
1995
Highly Cited
1995
We study session key distribution in the three-party setting of Needham and Schroeder. (This is the trust model assumed by the… (More)
Is this relevant?