Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,301,604 papers from all fields of science
Search
Sign In
Create Free Account
Transient-key cryptography
Transient-key cryptography is a form of public-key cryptography wherein keypairs are generated and assigned to brief intervals of time instead of to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
ANSI ASC X9.95 Standard
Archive
Bitcoin
Cryptographic hash function
Expand
Broader (2)
Data security
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Freeze & Crypt: Linux Kernel Support for Main Memory Encryption
Manuel Huber
,
Julian Horsch
,
Junaid Ali
,
Sascha Wessel
International Conference on Security and…
2017
Corpus ID: 37390265
We present Freeze & Crypt, a framework for RAM encryption. Our goal is to protect the sensitive data the processes keep in RAM…
Expand
2014
2014
Method for cloud calculating system terminal to realize docking between GTK (group transient key) graphical interfaces and cloud application
陈昱
2014
Corpus ID: 140261033
The invention discloses a method for a cloud calculating system terminal to realize docking between GTK (group transient key…
Expand
2013
2013
A Novel Authentication Scheme for V2I Communication Based on WAVE Unicast Services
A. Suwannasa
,
S. Puangpronpitag
,
Wirat Phongsiri
Int. J. Distributed Sens. Networks
2013
Corpus ID: 43024064
One of the most challenging issues in vehicular network designs is security matter. Particularly, there have been several…
Expand
Review
2011
Review
2011
Probing dioxygen activation mechanisms in heme-containing enzymes by heme models
Jin-Gang Liu
,
Y. Naruta
2011
Corpus ID: 54044308
In this mini-review, we summarize our recent synthetic model studies on the mechanism of dioxygen reduction reaction involved in…
Expand
2010
2010
Method, apparatus and system for updating group transient key
胡建如
,
刘国平
,
颜林志
,
唐建文
2010
Corpus ID: 149802411
One of the group transient key update method, apparatus and system, the method comprising the steps of: requesting access point…
Expand
2010
2010
Fast Handoff among IEEE 802.11r Mobility Domains
Kuang-Hui Chi
,
C. Tseng
,
Ya-Hsuan Tsai
Journal of information science and engineering
2010
Corpus ID: 7057708
This paper deals with secure fast handoff among access points (APs) of different IEEE 802.11r mobility domains. We leverage…
Expand
2007
2007
Method and system for secure processing of authentication key material in an ad hoc wireless network
안토니 제이. 브래스키츠
,
스테펜 피. 에모트
2007
Corpus ID: 195951014
Ad hoc method and system for secure processing of authentication key material in a wireless network enables secure distribution…
Expand
Review
2001
Review
2001
Teacher education in Papua New Guinea : policy and practice 1946-1996
P. Quartermaine
2001
Corpus ID: 152856977
This was a study in Papua New Guinea (PNG) of the planning and implementation of a new three-year teacher education programme…
Expand
1998
1998
Transient key digital stamp method and system
マイクル ディー. ドイル、
1998
Corpus ID: 146054692
1980
1980
A time-luck tradeoff in cryptography
G. Brassard
21st Annual Symposium on Foundations of Computer…
1980
Corpus ID: 18216169
New definitions are proposed for the security of Transient-Key Cryptography (a variant on Public-Key Cryptography) that account…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE