Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,872,332 papers from all fields of science
Search
Sign In
Create Free Account
Static key
A cryptographic key is called static if it is intended for use for a relatively long period of time and is typically intended for use in many…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Cryptographic key types
Cryptography
Ephemeral key
Key (cryptography)
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
PROTECTING PENETRATION TESTS : RECOMMENDATIONS FOR IMPROVING ENGAGEMENT SECURITY
2017
Corpus ID: 267865840
This paper, and its associated presentation, represents a capstone to previous years’ work by the author on the subject of…
Expand
2016
2016
Abstracting cryptographic protocols
Esfandiar Mohammadi
2016
Corpus ID: 30621124
ing Cryptographic
Review
2015
Review
2015
A Survey on Efficient Hashing Techniques in Software Configuration Management
Bernhard Grill
2015
Corpus ID: 35891547
This paper presents a survey on efficient hashing techniques in software configuration management scenarios. Therefore it…
Expand
2014
2014
Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes
D. Luke
,
Dr. Jayasudha
2014
Corpus ID: 17096231
The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks. The existing system is based on Spread Spectrum…
Expand
2014
2014
Improvement of a Weak RFID Authentication Protocol Making Drug Administration Insecure
M. H. Özcanhan
2014
Corpus ID: 3900307
Many RFID authentication protocols have been proposed for safe drug administration. Unfortunately, many of the proposed protocols…
Expand
2013
2013
Dynamic encryption key design and management for memory data encryption in embedded systems
Mei Hong
,
Hui Guo
,
S. Parameswaran
IEEE Computer Society Annual Symposium on VLSI
2013
Corpus ID: 18336836
To effectively encrypt data memory contents of an embedded processor, multiple keys which are dynamically changed are necessary…
Expand
2011
2011
Minimal perfect hashing: A competitive method for indexing internal memory
Fabiano C. Botelho
,
A. Lacerda
,
G. Menezes
,
N. Ziviani
Information Sciences
2011
Corpus ID: 45400121
2010
2010
Toward Cloud-Based Key Management for Outsourced Databases
N. Bennani
,
E. Damiani
,
S. Cimato
IEEE 34th Annual Computer Software and…
2010
Corpus ID: 7956166
A major drawback of implementing Database-as-a-Service (DaaS) on untrusted servers is the complexity of key management required…
Expand
2009
2009
Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents
Pablo Najera
,
Francisco Moyano
,
Javier López
Journal of universal computer science (Online)
2009
Corpus ID: 833500
Traditional paper documents are not likely to disappear in the near future as they are present everywhere in daily life, however…
Expand
1975
1975
Distribution-dependent hashing functions and their characteristics
R. Deutscher
,
P. Sorenson
,
J. Tremblay
ACM SIGMOD Conference
1975
Corpus ID: 14647341
In this paper procedures are studied for storing, accessing, updating, and reorganizing data in large files whose organization is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE