Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Transient-key cryptography

Transient-key cryptography is a form of public-key cryptography wherein keypairs are generated and assigned to brief intervals of time instead of to… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
  • 陈昱
  • 2014
  • Corpus ID: 140261033
The invention discloses a method for a cloud calculating system terminal to realize docking between GTK (group transient key… Expand
Is this relevant?
2012
2012
With the growing popularity of vehicle-based mobile devices, vehicular networks are becoming an essential part of wireless… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2011
2011
This paper describes a Security Enhanced AODV routing protocol for wireless mesh networks (SEAODV). SEAODV employs Blom's key pre… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Is this relevant?
2010
2010
One of the group transient key update method, apparatus and system, the method comprising the steps of: requesting access point… Expand
Is this relevant?
2007
2007
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • table 1
Is this relevant?
1993
1993
To ensure atomicity of transactions in distributed systems so-called 2-phase commit (2PC) protocols have been proposed. The basic… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1981
1981
Abstract New definitions are proposed for the security of Transient-Key Cryptography (a variant on Public-Key Cryptography) that… Expand
Is this relevant?
1980
1980
  • Gilles Brassard
  • 21st Annual Symposium on Foundations of Computer…
  • 1980
  • Corpus ID: 18216169
New definitions are proposed for the security of Transient-Key Cryptography (a variant on Public-Key Cryptography) that account… Expand
Is this relevant?
1979
1979
  • Gilles Brassard
  • 20th Annual Symposium on Foundations of Computer…
  • 1979
  • Corpus ID: 1970230
It seems very difficult to give a formal definition of computational security for Public Key Cryptography. We define a slightly… Expand
Is this relevant?