The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Symmetric-key (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-2000 (18) 2001-2002 (16) 2003 (20) 2004 (22) 2005 (41) 2006 (24) 2007 (46) 2008 (50) 2009 (33) 2010 (20) 2011-2012 (24) 2013 (17) 2014 (15) 2015 (17) 2016 (27) 2017 (22) 2018 (18) 2019 (23) 2020 (24) 2021 (25) 2022 (27) 2023-2024 (14)
Publication types (Num. hits)
article(186) book(1) incollection(2) inproceedings(339) phdthesis(15)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 293 occurrences of 177 keywords

Results
Found 543 publication records. Showing 543 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
88Arshad Noor Securing the core with an Enterprise Key Management Infrastructure (EKMI). Search on Bibsonomy IDtrust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF XML encryption (XENC), XML signature (DSIG), enterprise key management infrastructure (EKMI), symmetric key client library (SKCL), symmetric key management system (SKMS), symmetric key services (SKS), symmetric key services markup language (SKSML), key-management (KM), public key infrastructure (PKI)
67Ashraf Bhery, Shigeki Hagihara, Naoki Yonezaki A Formal System for Analysis of Cryptographic Encryption and Their Security Properties. Search on Bibsonomy ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF unjudgment, symmetric-content-non-malleability, symmetric-content-indistinguishability, symmetric-key-indistinguishablity, symmetric-content-length-indistinguishability, encryption, judgment, deduction systems
59Yi-Hua E. Yang, Joseph D. Touch Protocol Family for Optimal and Deterministic Symmetric Key Assignment. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collusion resilience, Maximum-Distance Separable code, symmetric key assignment, symmetric key pre-distribution, Reed-Solomon code
49Jaap-Henk Hoepman Secret Key Authentication with Software-Only Verification. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF symmetric key cryptography, authentication, smart cards
47Debra L. Cook, Angelos D. Keromytis Conversion and Proxy Functions for Symmetric Key Ciphers. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Symmetric Key Cipher Design, Functional Composition, Proxy Cryptography
44MingXin Lu, Xuejia Lai, Guozhen Xiao, Lei Qin Symmetric-key cryptosystem with DNA technology. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF symmetric-key encryption, DNA cryptography, DNA computing
41Michael Hitchens, Vijay Varadharajan esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF design choices, secure interactions, key establishment protocols, client responsibility, trusted server responsibility, inter-domain protocols, symmetric key systems, OSF Distributed Computing Environment, distributed systems, message authentication, authentication protocols, Kerberos
40Haodong Wang, Bo Sheng, Chiu C. Tan 0001, Qun Li 0001 Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control. Search on Bibsonomy ICDCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Agus Setiawan, David Adiutama, Julius Liman, Akshay Luther, Rajkumar Buyya GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Bruce Christianson, Bruno Crispo, James A. Malcolm Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Taketsugu Yao, Shigeru Fukunaga, Toshihisa Nakai Reliable Broadcast Message Authentication in Wireless Sensor Networks. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF One-way Key Chain, Secure Acknowledgment, Sensor Networks, Message Authentication, Software Update, Symmetric-key
34Ayesha Naureen, Attiya Akram, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Symmetric Key Cryptography (SKC), Security, Wireless Sensor Network (WSN), Key Management, Public Key Cryptography (PKC)
32Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X. Liu Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF symmetric key distribution protocols, Border gateway protocol, routing security, collusion resistance
32R. Satheesh Kumar, E. Pradeep, K. Naveen, R. Gunasekaran Enhanced Cost Effective Symmetric Key Algorithm for Small Amount of Data. Search on Bibsonomy ICSAP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Shared key, Small data, Security, Cryptography, Encryption, Decryption, Secret key, Symmetric key
31Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poornima, M. Divya Routing Protocol Security Using Symmetric Key Based Techniques. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Dimitris Theodoropoulos, Alexandros Siskos, Dionisios N. Pnevmatikatos CCproc: A Custom VLIW Cryptography Co-processor for Symmetric-Key Ciphers. Search on Bibsonomy ARC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cryptography, VLIW, reconfigurable processors
31Walter Bamberger, Oliver Welter, Stephan Spitz Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SIM, machine-to-machine communication, symmetric key infrastructure, message-based communication, mobile network
30Suat Özdemir, Hasan Cam Key establishment with source coding and reconciliation for wireless sensor networks. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Yevgeniy Dodis, Daniel Wichs Non-malleable extractors and symmetric key cryptography from weak secrets. Search on Bibsonomy STOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bounded retrieval model, information reconcilliation, authentication, encryption, information theoretic security, randomness extractors, privacy amplification, authenticated key agreement
29Serge Vaudenay On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Alexander W. Dent A Designer's Guide to KEMs. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Véronique Cortier, Graham Steel A Generic Security API for Symmetric Key Management on Cryptographic Devices. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum Symmetric Key Authentication Services Revisited. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Bezawada Bruhadeshwar, Kishore Kothapalli A Family of Collusion Resistant Symmetric Key Protocols for Authentication. Search on Bibsonomy ICDCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Key Distribution, Collusion resistance
25A. Murat Fiskiran, Ruby B. Lee On-Chip Lookup Tables for Fast Symmetric-Key Encryption. Search on Bibsonomy ASAP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Ayesha Naureen, Attiya Akram, Tariq Maqsood, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed Performance and Security Assessment of a PKC Based Key Management Scheme for Hierarchical Sensor Networks. Search on Bibsonomy VTC Spring The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Yun Zhou, Yuguang Fang Scalable and deterministic key agreement for large scale networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Tim Güneysu, Bodo Möller, Christof Paar New Protection Mechanisms for Intellectual Property in Reconfigurable Logic. Search on Bibsonomy FCCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Jung-Muk Lim, Hyung-Jin Lim, Tai-Myoung Chung Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X. Liu Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Jiya Jiang, Tong Liu, Guifen Zhao A Two-Way Authentication Based on One-Time SMS4 Algorithm and Combined Symmetric Key. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Hou Huifang, Kaizhi Huang, Liu Guangqiang CPK and ECC-Based Authentication and Key Agreement Scheme for Heterogeneous Wireless Network. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Qiang Huang, Johnas Cukier, Hisashi Kobayashi, Bede Liu, Jinyun Zhang Fast authenticated key establishment protocols for self-organizing sensor networks. Search on Bibsonomy Wireless Sensor Networks and Applications The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, sensor network, elliptic curve cryptography, key establishment
23Eun-Jun Yoon, Kee-Young Yoo Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Three-party, Authentication, Cryptography, Password, Key agreement, Token
22Franciszek Seredynski, Pascal Bouvry, Albert Y. Zomaya Cellular Programming and Symmetric Key Cryptography Systems. Search on Bibsonomy GECCO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Wenliang Du, Ronghua Wang, Peng Ning An efficient scheme for authenticating public keys in sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2005 DBLP  DOI  BibTeX  RDF deployment knowledge, wireless sensor networks, public key, merkle tree
21Limin Wang, Sandeep S. Kulkarni Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Hao Yang 0004, Songwu Lu Commutative cipher based en-route filtering in wireless sensor networks. Search on Bibsonomy VTC Fall (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Rolf Blom An Optimal Class of Symmetric Key Generation Systems. Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
20Alireza T. Boloorchi, Mansur H. Samadzadeh, T. Chen Corrigendum to "Symmetric threshold multipath (STM): An online symmetric key management scheme" [Inform. Sci. 268(2014) 489-504]. Search on Bibsonomy Inf. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Alireza T. Boloorchi, Mansur H. Samadzadeh, T. Chen Symmetric Threshold Multipath (STM): An online symmetric key management scheme. Search on Bibsonomy Inf. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Matthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan The Long-Short-Key Primitive and Its Applications to Key Security. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Dungara Ram Choudhary, Dev Anshul, Suman Roy 0001, Chandrashekhar Thejaswi P. S. Computationally and Resource Efficient Group Key Agreement for Ad Hoc Sensor Networks. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Fengguang An, Xiuzhen Cheng 0001, Jose Manny Rivera, Jiang Li 0009, Z. Cheng PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, Sensor networks, key management, key distribution
20Emily Shen, Elaine Shi, Brent Waters Predicate Privacy in Encryption Systems. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar Public Key Cryptography in Sensor Networks - Revisited. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Yevgeniy Dodis, Nelly Fazio Public Key Broadcast Encryption for Stateless Receivers. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Siguna Müller, Winfried B. Müller The Security of Public Key Cryptosystems Based on Integer Factorization. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem
19Mostafa-Sami M. Mostafa, Safia H. Deif, Hisham Abdel Elazeem Ismail Kholidy ULTRA GRIDSEC: Peer-to-Peer Computational Grid Middleware Security Using High Performance Symmetric Key Cryptography. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ULTRA GRIDSEC, TDES, security, Peer-to-Peer, cryptography, Computational, encryption, high-performance, schema, Grid Middleware, symmetric
19Jason Yang, James Goodman 0001 Symmetric Key Cryptography on Modern Graphics Hardware. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Satyajit Banerjee, Debapriyay Mukhopadhyay Symmetric key based authenticated querying in wireless sensor networks. Search on Bibsonomy InterSense The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authenticated querying, pairwise key pre-distribution, perfect and provable security, symmetric and public key cryptography
19A. Murat Fiskiran, Ruby B. Lee Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Zulfikar Ramzan, Leonid Reyzin On the Round Security of Symmetric-Key Cryptographic Primitives. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Jerome Burke, John McDonald, Todd M. Austin Architectural Support for Fast Symmetric-Key Cryptography. Search on Bibsonomy ASPLOS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Masayuki Yoshino, Ken Naganuma, Hisayoshi Satoh Symmetric Searchable Encryption for Database Applications. Search on Bibsonomy NBiS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF indistinguishablity, symmetric-key cryptography, database, security proof, searchable encryption
19Ramon Novales, Neeraj Mittal, Kamil Saraç SKAIT: A Parameterized Key Assignment Scheme for Wireless Networks. Search on Bibsonomy ISPDC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF confidential communication, symmetric key assignment, key pre-distribution, collusion resistance
19Sakshi Dhall, Saibal K. Pal Design of a New Block Cipher Based on Conditional Encryption. Search on Bibsonomy ITNG The full citation details ... 2010 DBLP  DOI  BibTeX  RDF avalanche effect, cryptanalytic attacks, Block cipher, rounds, computational efficiency, symmetric key
19Pritam Gajkumar Shah, Xu Huang 0001, Dharmendra Sharma 0001 Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks. Search on Bibsonomy AINA Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Symmetric Key Cryptography, Elliptic Curve Diffie Hellman Scheme, Wireless Sensor Networks, Elliptical Curve Cryptography, Scalar multiplication
19Sang-Ho Shin, Geum-Dal Park, Kee-Young Yoo A Virtual Three-Dimension Cellular Automata Pseudorandom Number Generator Based on the Moore Neighborhood Method. Search on Bibsonomy ICIC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Symmetric Key Cryptography, Cellular Automata (CA), Pseudorandom Number Generator (PRNG), One-time Pad
19Jens-Peter Kaps Chai-Tea, Cryptographic Hardware Implementations of xTEA. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF symmetric key algorithms, TEA, XTEA, FPGA, ASIC, Efficient implementation
19Mohammad Al-Shurman, Seong-Moo Yoo, Bonam Kim Distributive Key Management for Mobile Ad Hoc Networks. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ad hoc networks, threshold cryptography, mobile security, symmetric key, MDS code
19Arshad Noor Identity protection factor (IPF). Search on Bibsonomy IDtrust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF asymmetric key, identification & authentication, identity protection factor (IPF), shared-secret, authentication, access control, identity management, symmetric key
19Jeff Lewis Cryptol: specification, implementation and verification of high-grade cryptographic applications. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptography, specification language, certification, high assurance, symmetric key
19Hyungkyu Lee, Jongwook Han, Kyoil Chung Security Architecture for Authentication and Authorization in the Intelligent and Ubiquitous Home Network. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Public Key mechanism, Symmetric Key Mechanism, Multi-home roaming, Authentication, Authorization, Certificate, Home network
19Yunru Zhang, Debiao He, Pandi Vijayakumar, Min Luo 0002, Xinyi Huang 0001 SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Awaneesh Kumar Yadav, An Braeken, Manoj Misra Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Liang Ni 0001, Hengsheng Zhou, Yawei Zhang, Xiaoyan Liu, Bingke Gu Provably Secure Symmetric-Key Privacy-Preserving authenticated key agreement protocol. Search on Bibsonomy ICCNS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19An Braeken Public key versus symmetric key cryptography in client-server authentication protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Chinmoy Biswas, Ratna Dutta Dynamic multi-key FHE in symmetric key setting from LWE without using common reference matrix. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Bo Wei, Weitao Xu, Kai Li 0002, Chengwen Luo 0001, Jin Zhang 0013 i2 Key: A Cross-sensor Symmetric Key Generation System Using Inertial Measurements and Inaudible Sound. Search on Bibsonomy IPSN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Emy Setyaningsih, Retantyo Wardoyo, Anny Kartika Sari Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution. Search on Bibsonomy Digit. Commun. Networks The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Seyed Farhad Aghili, Amirhossein Adavoudi Jolfaei, Aysajan Abidin SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
19An Braeken Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak. Search on Bibsonomy Sensors The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Gildas Avoine, Sébastien Canard, Loïc Ferreira Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy. Search on Bibsonomy CT-RSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Anwar Ghani, Khwaja Mansoor, Shahid Mehmood, Shehzad Ashraf Chaudhry, Arif Ur Rahman, Malik Najmus Saqib Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key. Search on Bibsonomy Int. J. Commun. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Gildas Avoine, Sébastien Canard, Loïc Ferreira Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
19Shweta Arora, Muzzammil Hussain Secure Session Key Sharing Using Symmetric Key Cryptography. Search on Bibsonomy ICACCI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19S. Anagha, Neenu Sebastian, K. Rosebell Paul A Comparative Study of Performance and Security Issues of Public Key Cryptography and Symmetric Key Cryptography in Reversible Data Hiding. Search on Bibsonomy IBICA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Prerna Mohit, G. P. Biswas Modification of Symmetric-Key DES into Efficient Asymmetric-Key DES using RSA. Search on Bibsonomy ICTCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Zouheir Labbi, Ahmed Maarof, Mohamed Senhadji, Mostafa Belkasmi Hybrid Encryption Approach Using Dynamic Key Generation and Symmetric Key Algorithm for RFID Systems. Search on Bibsonomy NETYS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Akinori Kawachi, Hirotoshi Takebe, Keisuke Tanaka Lower Bounds for Key Length of k-wise Almost Independent Permutations and Certain Symmetric-Key Encryption Schemes. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Mohammad Sadeq Dousti, Rasool Jalili FORSAKES: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes. Search on Bibsonomy Adv. Math. Commun. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Jayagopal Narayanaswamy, Raghav V. Sampangi, Srinivas Sampalli HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19A. Jegatheesan, D. Manimegalai Symmetric key management for mobile ad hoc networks using novel secure and authenticated key distribution protocol-revised. Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Mohammad Sadeq Dousti, Rasool Jalili FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
19Prakash Kuppuswamy, Saeed Q. Y. Al-Khalidi Hybrid encryption/decryption technique using new public key and symmetric key algorithm. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Guangyu Zhu, Gul N. Khan Symmetric key based RFID authentication protocol with a secure key-updating scheme. Search on Bibsonomy CCECE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Yevgeniy Dodis, Weiliang Luo, Shouhuai Xu, Moti Yung Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari Bhat Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2011 DBLP  BibTeX  RDF
19Asoke Nath, Saima Ghosh, Meheboob Alam Mallick Symmetric Key Cryptography Using Random Key Generator. Search on Bibsonomy Security and Management The full citation details ... 2010 DBLP  BibTeX  RDF
19Imran Erguler, Emin Anarim A Password-Based Key Establishment Protocol with Symmetric Key Cryptography. Search on Bibsonomy WiMob The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Tyler Moore 0001, Jolyon Clulow Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Bruce Christianson Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Mikhail J. Atallah, Marina Blanton, Nelly Fazio, Keith B. Frikken Dynamic and Efficient Key Management for Access Hierarchies. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Efficient key derivation, key management, hierarchical access control
18Jun Zhou, Mingxing He An Improved Distributed Key Management Scheme in Wireless Sensor Networks. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Distributed wireless sensor networks, Key management, Secret sharing, Continuity
18Fan Zhang 0010, Zhijie Jerry Shi, Bing Wang 0001 Chord-Based Key Establishment Schemes for Sensor Networks. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Ashok Kumar Das, Indranil Sengupta 0001 An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 543 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license