Skip to search formSkip to main contentSkip to account menu

Transient-key cryptography

Transient-key cryptography is a form of public-key cryptography wherein keypairs are generated and assigned to brief intervals of time instead of to… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Recent advances in cloud computing have led to the advent of Business-to-Business Software as a Service (SaaS) solutions, opening… 
2015
2015
The Hole 196 vulnerability allows malicious insiders to inject spoofed broadcast/multicast frames encrypted with group transient… 
Highly Cited
2011
Highly Cited
2011
This paper describes a Security Enhanced AODV routing protocol for wireless mesh networks (SEAODV). SEAODV employs Blom's key pre… 
2010
2010
In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs… 
Review
2007
Review
2007
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms… 
Highly Cited
2007
Highly Cited
2007
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause… 
1993
1993
To ensure atomicity of transactions in distributed systems so-called 2-phase commit (2PC) protocols have been proposed. The basic… 
1981
1981
  • G. Brassard
  • J. Comput. Syst. Sci.
  • 1981
  • Corpus ID: 43541472
Highly Cited
1979
Highly Cited
1979
  • G. Brassard
  • 20th Annual Symposium on Foundations of Computer…
  • 1979
  • Corpus ID: 1970230
It seems very difficult to give a formal definition of computational security for Public Key Cryptography. We define a slightly…