Transient-key cryptography

Transient-key cryptography is a form of public-key cryptography wherein keypairs are generated and assigned to brief intervals of time instead of to… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1979-2015
02419792015

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The Hole 196 vulnerability allows malicious insiders to inject spoofed broadcast/multicast frames encrypted with group transient… (More)
  • figure 1
  • figure 3
  • figure 5
  • figure 6
  • table I
Is this relevant?
2011
2011
This paper describes a Security Enhanced AODV routing protocol for wireless mesh networks (SEAODV). SEAODV employs Blom’s key pre… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Is this relevant?
2011
2011
SciQL (pronounced as ‘cycle’) is a novel SQL-based array query language for scientific applications with both tables and arrays… (More)
  • figure 1
Is this relevant?
2011
2011
Authentication and key exchange is a challenging area in wireless networks. The authentication process of IEEE 802.1U is using… (More)
  • figure 1
  • table I
  • figure 3
  • table II
Is this relevant?
2010
2010
In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
2009
2009
Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2007
2007
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • table 1
Is this relevant?
2006
2006
Quantum cryptography is considered as a promising solution towards absolute security in long-term cryptosystems. While the… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 6
Is this relevant?
1980
1980
New definitions are proposed for the security of Transient-Key Cryptography (a variant on Public-Key Cryptography) that account… (More)
Is this relevant?
1979
1979
It seems very difficult to give a formal definition of computational security for Public Key Cryptography. We define a slightly… (More)
Is this relevant?