Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,099,370 papers from all fields of science
Search
Sign In
Create Free Account
Shared secret
Known as:
Shared
, Shared secrets
In cryptography, a shared secret is a piece of data, known only to the parties involved, in a secure communication. The shared secret can be a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
37 relations
Authentication
Bluetooth
CRAM-MD5
Challenge-Handshake Authentication Protocol
Expand
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
An over-the-air key establishment protocol using keyless cryptography
Yuexin Zhang
,
Yang Xiang
,
Tao Wang
,
Wei Wu
,
Jian Shen
Future generations computer systems
2018
Corpus ID: 4479151
2017
2017
Two-Phase Image Encryption Scheme Based on FFCT and Fractals
Mervat Mikhail
,
Y. Abouelseoud
,
G. Elkobrosy
Secur. Commun. Networks
2017
Corpus ID: 46819864
This paper blends the ideas from recent researches into a simple, yet efficient image encryption scheme for colored images. It is…
Expand
2014
2014
A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption
T. Barakat
KSII Transactions on Internet and Information…
2014
Corpus ID: 35119794
Deniable encryption, introduced in 1997 by Canetti, Dwork, Naor, and Ostrovsky, guarantees that the sender or the receiver of a…
Expand
2011
2011
Energy efficiency in M2M networks: A cooperative key establishment system
Yosra Ben Saied
,
Alexis Olivereau
,
D. Zeghlache
International Conference on Ultra Modern…
2011
Corpus ID: 26360233
Security requirements for the integration of emerging M2M networks in future internet of things are addressed. The heterogeneous…
Expand
2010
2010
Security and Privacy in Next Generation Mobile Networks : LTE and Femtocells
Igor Bilogrevic
2010
Corpus ID: 6397259
Cellular mobile network are used by more than 4 billion users worldwide. Yet, security and privacy issues in the next generation…
Expand
2010
2010
A robust pair-wise and group key management protocol for wireless sensor network
Musfiq Rahman
,
S. Sampalli
,
S. Hussain
IEEE Globecom Workshops
2010
Corpus ID: 36292603
The design of efficient key management protocols for wireless sensor networks (WSNs) is a challenging task. To be robust and…
Expand
2008
2008
Key Distribution for Wireless Sensor Networks and Physical Unclonable Functions
J. Guajardo
,
Sandeep S. Kumar
,
P. Tuyls
2008
Corpus ID: 59471747
Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially…
Expand
2005
2005
A New (t, n)-Threshold Multi-secret Sharing Scheme
Huixian Li
,
Chun-tian Cheng
,
Liaojun Pang
International Conference on Computational…
2005
Corpus ID: 22501923
In a (t, n)-threshold multi-secret sharing scheme, at least t or more participants in n participants can reconstruct p(p ≥ 1…
Expand
2005
2005
Securing credit card transactions with one-time payment scheme
Yingjiu Li
,
Xinwen Zhang
Electronic Commerce Research and Applications
2005
Corpus ID: 1159315
1993
1993
On 2-level secret sharing
A. Beutelspacher
,
F. Wettl
Des. Codes Cryptogr.
1993
Corpus ID: 27503772
In this paper, using recent results in finite geometry, we study a certain class of 2-level shared secret schemes. We shall…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE