Skip to search formSkip to main contentSkip to account menu

Strong key

Known as: Strong name 
Strong Key is a naming convention used in computer programming. There can be more than one component (e.g.: DLL) with the same naming, but with… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
The existing DNA based image cryptosystems, their DNA coding scheme just employs four DNA symbols, namely A, T, C and G, to… 
Highly Cited
2017
Highly Cited
2017
Key exposure is one serious security problem for cloud storage auditing. In order to deal with this problem, cloud storage… 
2016
2016
The key-insulated signature scheme provides a good method to solve key exposure problem. The key-insulated mechanism has been… 
2016
2016
A hierarchical key assignment scheme is a method to assign some private information and encryption keys to a set of classes in a… 
2015
2015
Devices equipped with accelerometer sensors such as today's mobile devices can make use of motion to exchange information. A… 
Highly Cited
2011
Highly Cited
2011
The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all… 
Highly Cited
2007
Highly Cited
2007
This paper proposes an accessible measure of the relevance of additional terms to a given query, describes and comments on the… 
1998
1998
In this paper a framework for classifying iterative symmetric block ciphers based on key schedules is provided. We use this…