Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,884,438 papers from all fields of science
Search
Sign In
Create Free Account
Smart key
Known as:
Advanced Key
, Keyless SmartAccess
, Push-button start
Expand
A smart key is an electronic access and authorization of system that which is available as an option or standard in several cars. It was first…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Authentication
Built-in self-test
Electronic control unit
Immobiliser
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Heuristic cryptanalysis of classical and modern ciphers
Ho Yean Li
,
Azman Samsudin
,
B. Belaton
13th IEEE International Conference on Networks…
2015
Corpus ID: 6134143
Block cipher algorithms are commonly used to secure confidential information in everyday user applications. However, it is quite…
Expand
2015
2015
Effective test strategy for testing automotive software
S. Barhate
International Conference on Intelligent Computing
2015
Corpus ID: 34470837
Electronic content is increasing in automobiles day by day. Functionalities like Air Bags, Anti-lock Braking, Driver Assistance…
Expand
2015
2015
Large-scale human action recognition with spark
Hanli Wang
,
Xiaobin Zheng
,
Bo Xiao
IEEE International Workshop on Multimedia Signal…
2015
Corpus ID: 2776926
In this paper, Apache Spark, the rising big data processing tool with in-memory computing ability, is explored to address the…
Expand
2009
2009
A new optimization algorithm and its application — Key cutting algorithm
Jing Qin
IEEE International Conference on Grey systems and…
2009
Corpus ID: 27652599
From the procedure how a locksmith match a key to a lock, a new algorithm called the "key-cutting algorithm" is introduced. There…
Expand
Highly Cited
2005
Highly Cited
2005
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
Takashi Ito
,
H. Ohta
,
Nori Matsuda
,
Takeshi Yoneda
ACM Workshop on Security of ad hoc and Sensor…
2005
Corpus ID: 13342918
Pairwise key establishment is a fundamental service provided in secure sensor networks. However, due to resource constraints…
Expand
2003
2003
Some attacks against vehicles' passive entry security systems and their solutions
A. Alrabady
,
S. Mahmud
IEEE Transactions on Vehicular Technology
2003
Corpus ID: 14898406
Recently, several companies have introduced passive entry systems for automotive applications. These systems are intended to…
Expand
Review
2000
Review
2000
Latest Generation Technology for Immobilizer Systems
2000
Corpus ID: 165152175
Since the introduction of immobilizer systems the need for improved security constantly increases. Many Anti Theft Systems make…
Expand
Highly Cited
1999
Highly Cited
1999
Passive entry of a DNA molecule into a small pore.
P. Gennes
1999
Corpus ID: 6303891
I consider a vesicle with an open pore of small radius rp, exposed to a DNA solution. The crucial moment is the entry, when a…
Expand
1999
1999
Multicast Security Management Protocol (MSMP) Requirements and Policy
H. Harney
,
E. Harder
1999
Corpus ID: 166345143
This Internet-Draft describes issues relating to the management of cryptographic keys in support of multicast communications. It…
Expand
Highly Cited
1986
Highly Cited
1986
Diel epibenthic activity of mayfly nymphs, and its nonconcordance with behavioral drift1
J. Allan
,
A. Flecker
,
N. McClintock
1986
Corpus ID: 7548984
Diel changes in the numbers and activity of mayfly (Ephemeroptera) nymphs on the substrate surface in a stony-bottom stream were…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE