Skip to search formSkip to main contentSkip to account menu

Transient-key cryptography

Transient-key cryptography is a form of public-key cryptography wherein keypairs are generated and assigned to brief intervals of time instead of to… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Development of distributed storage, cell phones, furthermore, removable hard drives have expanded the versatility of usage of… 
2014
2014
  • 陈昱
  • 2014
  • Corpus ID: 140261033
The invention discloses a method for a cloud calculating system terminal to realize docking between GTK (group transient key… 
2013
2013
One of the most challenging issues in vehicular network designs is security matter. Particularly, there have been several… 
2013
2013
Recently, there have been several potential attacks (e.g., bogus message, eavesdropping, source modification, invasion of privacy… 
2013
2013
The IEEE 802.11i standard has been designed to enhance security in wireless networks. In the 4-way handshake the supplicant and… 
2010
2010
In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs… 
2010
2010
One of the group transient key update method, apparatus and system, the method comprising the steps of: requesting access point… 
2007
2007
Ad hoc method and system for secure processing of authentication key material in a wireless network enables secure distribution… 
1980
1980
  • G. Brassard
  • 1980
  • Corpus ID: 18216169
New definitions are proposed for the security of Transient-Key Cryptography (a variant on Public-Key Cryptography) that account…