Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,233,525 papers from all fields of science
Search
Sign In
Create Free Account
Static key
A cryptographic key is called static if it is intended for use for a relatively long period of time and is typically intended for use in many…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Cryptographic key types
Cryptography
Ephemeral key
Key (cryptography)
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A Note on the Static-Static Key Agreement Protocol from Supersingular Isogenies
Selçuk Kayacan
IACR Cryptology ePrint Archive
2019
Corpus ID: 198119619
The basic Supersingular Isogeny Diffie-Hellman (SIDH) key agreement protocol is insecure due to an attack described by Galbraith…
Expand
2017
2017
PROTECTING PENETRATION TESTS : RECOMMENDATIONS FOR IMPROVING ENGAGEMENT SECURITY
2017
Corpus ID: 267865840
This paper, and its associated presentation, represents a capstone to previous years’ work by the author on the subject of…
Expand
2016
2016
An Adaptive Fuzzy C-Means (AFCM) Clustering Method for Retrieval of Videos in Multimedia
S. Balaji
2016
Corpus ID: 36046908
Content Based Video Retrieval (CBVR) system anxieties with the presentation of video segmentation technique for the retrieval of…
Expand
2016
2016
Abstracting cryptographic protocols
Esfandiar Mohammadi
2016
Corpus ID: 30621124
ing Cryptographic
Review
2016
Review
2016
Content Based Video Retrieval – Concept & Applications – A Review Paper
Sweta G. Phegade
,
Kalyani N Neve
2016
Corpus ID: 212450933
In Today’s electronic era, we have a cheap storage device that’s why the amount of digital data produced and added in the…
Expand
2015
2015
Design of the Identity Authentication and Key Management System Based on Wireless Community
Linsheng Wang
,
Ke Zhou
2015
Corpus ID: 62792120
With the rapid development of wireless communication technology, wireless community has brought a lot of convenience to people's…
Expand
Review
2015
Review
2015
A Survey on Efficient Hashing Techniques in Software Configuration Management
Bernhard Grill
2015
Corpus ID: 35891547
This paper presents a survey on efficient hashing techniques in software configuration management scenarios. Therefore it…
Expand
2014
2014
Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes
D. Luke
,
Dr. Jayasudha
2014
Corpus ID: 17096231
The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks. The existing system is based on Spread Spectrum…
Expand
2014
2014
Improvement of a Weak RFID Authentication Protocol Making Drug Administration Insecure
M. H. Özcanhan
2014
Corpus ID: 3900307
Many RFID authentication protocols have been proposed for safe drug administration. Unfortunately, many of the proposed protocols…
Expand
2004
2004
Dynamic key messaging for cluster computing
Ming-hua Zhu
,
Yang Wang
,
Meng Ding
,
C. Katsinis
Third IEEE International Symposium on Network…
2004
Corpus ID: 7972055
Over the past decades, distributed computing has been gaining popularity. It provides more computing power and memory space for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE