Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,162,063 papers from all fields of science
Search
Sign In
Create Free Account
Transient-key cryptography
Transient-key cryptography is a form of public-key cryptography wherein keypairs are generated and assigned to brief intervals of time instead of to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
ANSI ASC X9.95 Standard
Archive
Bitcoin
Cryptographic hash function
Expand
Broader (2)
Data security
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
On-the-Fly Encryption Security in Remote Storage
Arun Prabhakar
,
P. S. Savin
,
K. Chandrasekaran
Fifth International Conference on Advances in…
2015
Corpus ID: 13541311
Development of distributed storage, cell phones, furthermore, removable hard drives have expanded the versatility of usage of…
Expand
2014
2014
Method for cloud calculating system terminal to realize docking between GTK (group transient key) graphical interfaces and cloud application
陈昱
2014
Corpus ID: 140261033
The invention discloses a method for a cloud calculating system terminal to realize docking between GTK (group transient key…
Expand
2013
2013
A Novel Authentication Scheme for V2I Communication Based on WAVE Unicast Services
A. Suwannasa
,
S. Puangpronpitag
,
Wirat Phongsiri
Int. J. Distributed Sens. Networks
2013
Corpus ID: 43024064
One of the most challenging issues in vehicular network designs is security matter. Particularly, there have been several…
Expand
2013
2013
A fast and efficient authentication scheme for WAVE unicast services in vehicular networks
A. Suwannasa
,
S. Puangpronpitag
International Conference on Ubiquitous and Future…
2013
Corpus ID: 11275907
Recently, there have been several potential attacks (e.g., bogus message, eavesdropping, source modification, invasion of privacy…
Expand
2013
2013
Analysing and attacking the 4-way handshake of IEEE 802.11i standard
Abdullah Alabdulatif
,
Xiaoqi Ma
,
L. Nolle
International Conference for Internet Technology…
2013
Corpus ID: 18803357
The IEEE 802.11i standard has been designed to enhance security in wireless networks. In the 4-way handshake the supplicant and…
Expand
2010
2010
SEAODV: A Security Enhanced AODV routing protocol for wireless mesh networks
Celia Li
,
Zhuang Wang
,
Cungang Yang
IEEE International Conference on Wireless and…
2010
Corpus ID: 19033708
In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs…
Expand
2010
2010
Method, apparatus and system for updating group transient key
胡建如
,
刘国平
,
颜林志
,
唐建文
2010
Corpus ID: 149802411
One of the group transient key update method, apparatus and system, the method comprising the steps of: requesting access point…
Expand
2007
2007
Method and system for secure processing of authentication key material in an ad hoc wireless network
안토니 제이. 브래스키츠
,
스테펜 피. 에모트
2007
Corpus ID: 195951014
Ad hoc method and system for secure processing of authentication key material in a wireless network enables secure distribution…
Expand
1998
1998
Transient key digital stamp method and system
マイクル ディー. ドイル、
1998
Corpus ID: 146054692
1980
1980
A time-luck tradeoff in cryptography
G. Brassard
21st Annual Symposium on Foundations of Computer…
1980
Corpus ID: 18216169
New definitions are proposed for the security of Transient-Key Cryptography (a variant on Public-Key Cryptography) that account…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE