Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,394,661 papers from all fields of science
Search
Sign In
Create Free Account
Strong key
Known as:
Strong name
Strong Key is a naming convention used in computer programming. There can be more than one component (e.g.: DLL) with the same naming, but with…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Broader (1)
.NET Framework
Computer programming
Public-key cryptography
Tamper resistance
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A Three-factor Two-way Identity Authentication Scheme in Mobile Internet
Mingwen Wang
,
Dongming Tang
2017
Corpus ID: 67826873
Mobile devices such as smartphones, tablet computers are widely used over the past years. In such mobile Internet environment…
Expand
2017
2017
Simple Security Definitions for and Constructions of 0-RTT Key Exchange
Britta Hale
,
Tibor Jager
,
S. Lauer
,
Jörg Schwenk
International Conference on Applied Cryptography…
2017
Corpus ID: 19811628
Zero Round-Trip Time (0-RTT) key exchange protocols allow for the transmission of cryptographically protected payload data…
Expand
2015
2015
ShakeMe: Key Generation from Shared Motion
Hidir Yuzuguzel
,
J. Niemi
,
S. Kiranyaz
,
M. Gabbouj
,
Thomas Heinz
IEEE International Conference on Computer and…
2015
Corpus ID: 9014859
Devices equipped with accelerometer sensors such as today's mobile devices can make use of motion to exchange information. A…
Expand
2015
2015
Dynamic Authentication Protocol for Mobile Networks Using Public-Key Cryptography
Mustafa A. Al-Fayoumi
,
M. Nababteh
,
M. S. Daoud
,
M. Alhawarat
2015
Corpus ID: 21751637
: The authentication and key agreement (AKA) protocol of Universal Mobile Telecommunication System (UMTS) is still vulnerable to…
Expand
2015
2015
Efficient provably secure password-based explicit authenticated key agreement
Ou Ruan
,
Neeraj Kumar
,
De-biao He
,
Jong‐Hyouk Lee
Pervasive and Mobile Computing
2015
Corpus ID: 42696850
2015
2015
An Enhanced Secure Mobility Management Scheme for Building IoT Applications
H. Chai
,
J. Choi
,
Jongpil Jeong
FNC/MobiSPC
2015
Corpus ID: 23000529
2009
2009
Simulation Support for Control Issues in the Context of Modern Diesel Air Path Systems
A. Albrecht
,
O. Grondin
,
+5 authors
P. Moulin
2009
Corpus ID: 54933504
It is now obvious that the air path system will have to increase its performance to manage the in-cylinder conditions required by…
Expand
2009
2009
A Strong Key Pre-distribution Scheme for Wireless Sensor Networks
Jianmin Zhang
,
Jian Li
,
Xiande Liu
International Conference on Networks Security…
2009
Corpus ID: 17213847
Key agreement is paramount for wireless sensor networks (WSNs) security. Many key pre-distribution schemes have been developed to…
Expand
2008
2008
Anti-counterfeiting using phosphor PUF
Dan Jiang
,
Cheun Ngen Chong
International Conference on Anti-counterfeiting…
2008
Corpus ID: 16593785
Anti-counterfeiting is a global problem. Brand owners suffer from huge losses due to counterfeits every year, and turn to…
Expand
1998
1998
Key Schedules of Iterative Block Ciphers
G. Carter
,
E. Dawson
,
Lauren Nielsen
Australasian Conference on Information Security…
1998
Corpus ID: 45852779
In this paper a framework for classifying iterative symmetric block ciphers based on key schedules is provided. We use this…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE