Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,536,293 papers from all fields of science
Search
Sign In
Create Free Account
Session key
A session key is a single-use symmetric key used for encrypting all messages in one communication session. A closely related term is content…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
Authenticated Key Exchange
Crypto phone
FEA-M
GNU Privacy Guard
Expand
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Ensuring Authenticity and Revocability for Wireless Body Area Network using Certificateless Cryptography
Ms. S.Padma
,
Dr.D.C.Joy
,
Winnie Wise
,
Mr. S. Malaiarasan
,
Ms. N. Rajapriya
2016
Corpus ID: 212506563
.
2014
2014
Design and Analysis of Chameleon Hashing Based Handover Authentication Scheme for Wireless Networks
Chinchen Chang
,
Ya-Chieh Huang
,
H. Tsai
J. Inf. Hiding Multim. Signal Process.
2014
Corpus ID: 1883896
An increasing number of mobile users are allowed and promoted universal access over the wireless networks. Roughly speaking, an…
Expand
2010
2010
Security Weakness of Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys
Qingfeng Cheng
,
Chuan-gui Ma
arXiv.org
2010
Corpus ID: 6375723
In AFRICACRYPT 2010, Abdalla et al. first proposed a slight modification to the computations steps of the BD protocol, called mBD…
Expand
2010
2010
A Group Key Agree Management Scheme for MANET
Xiaojing Du
,
Zhifeng Zhao
2010
Corpus ID: 130091613
Mobility of the nodes in Mobile Ad Hoc Network usually made huge change of network topology. This challenges the secure of the…
Expand
2009
2009
A design of security protocol using hybrid encryption technique (AES-Rijndael and RSA)
E. Ramaraj
,
S. Karthikeyan
,
M. Hemalatha
2009
Corpus ID: 64879392
This paper aims to design the new security protocol using hybrid encryption technique for on line transaction. The hybrid…
Expand
2008
2008
A Secure Remote User Authentication Scheme with Smart Cards
Manoj Kumar
IACR Cryptology ePrint Archive
2008
Corpus ID: 8998539
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret…
Expand
2007
2007
The Martini Synch : Using Accelerometers for Device Pairing
D. Kirovski
,
M. Sinclair
,
David Wilson
2007
Corpus ID: 15177698
Device pairing is a significant problem for a large class of increasingly popular resource-constrained wireless protocols such as…
Expand
2006
2006
Secure Internet telephony : design, implementation and performance measurements
Erik Eliasson
2006
Corpus ID: 17375292
In this paper we study the possibility of establishing a secure VoIP telephone call using SIP. Different security services…
Expand
2000
2000
Protocol-independent secrecy
J. Millen
,
H. Ruess
Proceeding IEEE Symposium on Security and…
2000
Corpus ID: 2048891
Inductive proofs of secrecy invariants for cryptographic protocols can be facilitated by separating the protocol dependent part…
Expand
1998
1998
Proving Trust in Systems of 2nd-Order Processes: Preliminary Results
M. Dam
Hawaii International Conference on System…
1998
Corpus ID: 1857473
We consider the problem of proving correctness properties for concurrent systems with features such as higher-order communication…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE