Skip to search formSkip to main contentSkip to account menu

Strong key

Known as: Strong name 
Strong Key is a naming convention used in computer programming. There can be more than one component (e.g.: DLL) with the same naming, but with… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Mobile devices such as smartphones, tablet computers are widely used over the past years. In such mobile Internet environment… 
2017
2017
Zero Round-Trip Time (0-RTT) key exchange protocols allow for the transmission of cryptographically protected payload data… 
2015
2015
Devices equipped with accelerometer sensors such as today's mobile devices can make use of motion to exchange information. A… 
2015
2015
: The authentication and key agreement (AKA) protocol of Universal Mobile Telecommunication System (UMTS) is still vulnerable to… 
2009
2009
It is now obvious that the air path system will have to increase its performance to manage the in-cylinder conditions required by… 
2009
2009
Key agreement is paramount for wireless sensor networks (WSNs) security. Many key pre-distribution schemes have been developed to… 
2008
2008
Anti-counterfeiting is a global problem. Brand owners suffer from huge losses due to counterfeits every year, and turn to… 
1998
1998
In this paper a framework for classifying iterative symmetric block ciphers based on key schedules is provided. We use this…