Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,292,476 papers from all fields of science
Search
Sign In
Create Free Account
Strong key
Known as:
Strong name
Strong Key is a naming convention used in computer programming. There can be more than one component (e.g.: DLL) with the same naming, but with…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Broader (1)
.NET Framework
Computer programming
Public-key cryptography
Tamper resistance
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
The image encryption algorithm based on chaos and DNA computing
Yong Zhang
Multimedia tools and applications
2018
Corpus ID: 25781037
The existing DNA based image cryptosystems, their DNA coding scheme just employs four DNA symbols, namely A, T, C and G, to…
Expand
Highly Cited
2017
Highly Cited
2017
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
Jia Yu
,
Huaqun Wang
IEEE Transactions on Information Forensics and…
2017
Corpus ID: 5601717
Key exposure is one serious security problem for cloud storage auditing. In order to deal with this problem, cloud storage…
Expand
2017
2017
Continuous leakage-resilient certificateless public key encryption with CCA security
Yanwei Zhou
,
Bo Yang
Knowledge-Based Systems
2017
Corpus ID: 32233244
2016
2016
Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model
Jiguo Li
,
H. Du
,
Yichen Zhang
Computer/law journal
2016
Corpus ID: 10297572
The key-insulated signature scheme provides a good method to solve key exposure problem. The key-insulated mechanism has been…
Expand
2016
2016
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes
Arcangelo Castiglione
,
A. D. Santis
,
B. Masucci
IEEE Transactions on Dependable and Secure…
2016
Corpus ID: 17188446
A hierarchical key assignment scheme is a method to assign some private information and encryption keys to a set of classes in a…
Expand
2015
2015
ShakeMe: Key Generation from Shared Motion
Hidir Yuzuguzel
,
J. Niemi
,
S. Kiranyaz
,
M. Gabbouj
,
Thomas Heinz
IEEE International Conference on Computer and…
2015
Corpus ID: 9014859
Devices equipped with accelerometer sensors such as today's mobile devices can make use of motion to exchange information. A…
Expand
Highly Cited
2011
Highly Cited
2011
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
L. Leng
,
Jiashu Zhang
Journal of Network and Computer Applications
2011
Corpus ID: 12918628
Highly Cited
2011
Highly Cited
2011
Peformance analysis of data encryption algorithms
O. Verma
,
R. Agarwal
,
Dhiraj Dafouti
,
Shobha Tyagi
International Conference on Electronic Computer…
2011
Corpus ID: 14643681
The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all…
Expand
Highly Cited
2007
Highly Cited
2007
Selecting query terms to build a specialised corpus from a restricted-access database.
Costas Gabrielatos
2007
Corpus ID: 1809458
This paper proposes an accessible measure of the relevance of additional terms to a given query, describes and comments on the…
Expand
1998
1998
Key Schedules of Iterative Block Ciphers
G. Carter
,
E. Dawson
,
Lauren Nielsen
Australasian Conference on Information Security…
1998
Corpus ID: 45852779
In this paper a framework for classifying iterative symmetric block ciphers based on key schedules is provided. We use this…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE