Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Transient-key cryptography

Transient-key cryptography is a form of public-key cryptography wherein keypairs are generated and assigned to brief intervals of time instead of to… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Recent advances in cloud computing have led to the advent of Business-to-Business Software as a Service (SaaS) solutions, opening… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
2015
2015
The Hole 196 vulnerability allows malicious insiders to inject spoofed broadcast/multicast frames encrypted with group transient… Expand
  • figure 1
  • figure 3
  • figure 5
  • figure 6
  • table I
2012
2012
With the growing popularity of vehicle-based mobile devices, vehicular networks are becoming an essential part of wireless… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Highly Cited
2011
Highly Cited
2011
This paper describes a Security Enhanced AODV routing protocol for wireless mesh networks (SEAODV). SEAODV employs Blom's key pre… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
2010
2010
  • C. Li, Z. Wang, C. Yang
  • IEEE 6th International Conference on Wireless and…
  • 2010
  • Corpus ID: 19033708
In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Highly Cited
2007
Highly Cited
2007
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • table 1
1993
1993
To ensure atomicity of transactions in distributed systems so-called 2-phase commit (2PC) protocols have been proposed. The basic… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
1981
1981
  • G. Brassard
  • J. Comput. Syst. Sci.
  • 1981
  • Corpus ID: 43541472
Abstract New definitions are proposed for the security of Transient-Key Cryptography (a variant on Public-Key Cryptography) that… Expand
Highly Cited
1979
Highly Cited
1979
  • G. Brassard
  • 20th Annual Symposium on Foundations of Computer…
  • 1979
  • Corpus ID: 1970230
It seems very difficult to give a formal definition of computational security for Public Key Cryptography. We define a slightly… Expand
1979
1979
It seems very difficult to give a formal definition of computational security for Public Key Cryptography. We define a slightly… Expand