|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 293 occurrences of 177 keywords
|
|
|
Results
Found 543 publication records. Showing 543 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
88 | Arshad Noor |
Securing the core with an Enterprise Key Management Infrastructure (EKMI). |
IDtrust |
2008 |
DBLP DOI BibTeX RDF |
XML encryption (XENC), XML signature (DSIG), enterprise key management infrastructure (EKMI), symmetric key client library (SKCL), symmetric key management system (SKMS), symmetric key services (SKS), symmetric key services markup language (SKSML), key-management (KM), public key infrastructure (PKI) |
67 | Ashraf Bhery, Shigeki Hagihara, Naoki Yonezaki |
A Formal System for Analysis of Cryptographic Encryption and Their Security Properties. |
ISSS |
2003 |
DBLP DOI BibTeX RDF |
unjudgment, symmetric-content-non-malleability, symmetric-content-indistinguishability, symmetric-key-indistinguishablity, symmetric-content-length-indistinguishability, encryption, judgment, deduction systems |
59 | Yi-Hua E. Yang, Joseph D. Touch |
Protocol Family for Optimal and Deterministic Symmetric Key Assignment. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
Collusion resilience, Maximum-Distance Separable code, symmetric key assignment, symmetric key pre-distribution, Reed-Solomon code |
49 | Jaap-Henk Hoepman |
Secret Key Authentication with Software-Only Verification. |
Financial Cryptography |
2000 |
DBLP DOI BibTeX RDF |
symmetric key cryptography, authentication, smart cards |
47 | Debra L. Cook, Angelos D. Keromytis |
Conversion and Proxy Functions for Symmetric Key Ciphers. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
Symmetric Key Cipher Design, Functional Composition, Proxy Cryptography |
44 | MingXin Lu, Xuejia Lai, Guozhen Xiao, Lei Qin |
Symmetric-key cryptosystem with DNA technology. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
symmetric-key encryption, DNA cryptography, DNA computing |
41 | Michael Hitchens, Vijay Varadharajan |
esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
design choices, secure interactions, key establishment protocols, client responsibility, trusted server responsibility, inter-domain protocols, symmetric key systems, OSF Distributed Computing Environment, distributed systems, message authentication, authentication protocols, Kerberos |
40 | Haodong Wang, Bo Sheng, Chiu C. Tan 0001, Qun Li 0001 |
Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control. |
ICDCS |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Agus Setiawan, David Adiutama, Julius Liman, Akshay Luther, Rajkumar Buyya |
GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Bruce Christianson, Bruno Crispo, James A. Malcolm |
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Taketsugu Yao, Shigeru Fukunaga, Toshihisa Nakai |
Reliable Broadcast Message Authentication in Wireless Sensor Networks. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
One-way Key Chain, Secure Acknowledgment, Sensor Networks, Message Authentication, Software Update, Symmetric-key |
34 | Ayesha Naureen, Attiya Akram, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed |
A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Symmetric Key Cryptography (SKC), Security, Wireless Sensor Network (WSN), Key Management, Public Key Cryptography (PKC) |
32 | Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X. Liu |
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough. |
IEEE Trans. Parallel Distributed Syst. |
2011 |
DBLP DOI BibTeX RDF |
symmetric key distribution protocols, Border gateway protocol, routing security, collusion resistance |
32 | R. Satheesh Kumar, E. Pradeep, K. Naveen, R. Gunasekaran |
Enhanced Cost Effective Symmetric Key Algorithm for Small Amount of Data. |
ICSAP |
2010 |
DBLP DOI BibTeX RDF |
Shared key, Small data, Security, Cryptography, Encryption, Decryption, Secret key, Symmetric key |
31 | Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poornima, M. Divya |
Routing Protocol Security Using Symmetric Key Based Techniques. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Dimitris Theodoropoulos, Alexandros Siskos, Dionisios N. Pnevmatikatos |
CCproc: A Custom VLIW Cryptography Co-processor for Symmetric-Key Ciphers. |
ARC |
2009 |
DBLP DOI BibTeX RDF |
Cryptography, VLIW, reconfigurable processors |
31 | Walter Bamberger, Oliver Welter, Stephan Spitz |
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
SIM, machine-to-machine communication, symmetric key infrastructure, message-based communication, mobile network |
30 | Suat Özdemir, Hasan Cam |
Key establishment with source coding and reconciliation for wireless sensor networks. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Yevgeniy Dodis, Daniel Wichs |
Non-malleable extractors and symmetric key cryptography from weak secrets. |
STOC |
2009 |
DBLP DOI BibTeX RDF |
bounded retrieval model, information reconcilliation, authentication, encryption, information theoretic security, randomness extractors, privacy amplification, authenticated key agreement |
29 | Serge Vaudenay |
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Alexander W. Dent |
A Designer's Guide to KEMs. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Véronique Cortier, Graham Steel |
A Generic Security API for Symmetric Key Management on Cryptographic Devices. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum |
Symmetric Key Authentication Services Revisited. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Bezawada Bruhadeshwar, Kishore Kothapalli |
A Family of Collusion Resistant Symmetric Key Protocols for Authentication. |
ICDCN |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Key Distribution, Collusion resistance |
25 | A. Murat Fiskiran, Ruby B. Lee |
On-Chip Lookup Tables for Fast Symmetric-Key Encryption. |
ASAP |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Ayesha Naureen, Attiya Akram, Tariq Maqsood, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed |
Performance and Security Assessment of a PKC Based Key Management Scheme for Hierarchical Sensor Networks. |
VTC Spring |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Yun Zhou, Yuguang Fang |
Scalable and deterministic key agreement for large scale networks. |
IEEE Trans. Wirel. Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Tim Güneysu, Bodo Möller, Christof Paar |
New Protection Mechanisms for Intellectual Property in Reconfigurable Logic. |
FCCM |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Jung-Muk Lim, Hyung-Jin Lim, Tai-Myoung Chung |
Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments. |
ICOIN |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X. Liu |
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong |
HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong |
HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Jiya Jiang, Tong Liu, Guifen Zhao |
A Two-Way Authentication Based on One-Time SMS4 Algorithm and Combined Symmetric Key. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Hou Huifang, Kaizhi Huang, Liu Guangqiang |
CPK and ECC-Based Authentication and Key Agreement Scheme for Heterogeneous Wireless Network. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Qiang Huang, Johnas Cukier, Hisashi Kobayashi, Bede Liu, Jinyun Zhang |
Fast authenticated key establishment protocols for self-organizing sensor networks. |
Wireless Sensor Networks and Applications |
2003 |
DBLP DOI BibTeX RDF |
security, sensor network, elliptic curve cryptography, key establishment |
23 | Eun-Jun Yoon, Kee-Young Yoo |
Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
Three-party, Authentication, Cryptography, Password, Key agreement, Token |
22 | Franciszek Seredynski, Pascal Bouvry, Albert Y. Zomaya |
Cellular Programming and Symmetric Key Cryptography Systems. |
GECCO |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Wenliang Du, Ronghua Wang, Peng Ning |
An efficient scheme for authenticating public keys in sensor networks. |
MobiHoc |
2005 |
DBLP DOI BibTeX RDF |
deployment knowledge, wireless sensor networks, public key, merkle tree |
21 | Limin Wang, Sandeep S. Kulkarni |
Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Hao Yang 0004, Songwu Lu |
Commutative cipher based en-route filtering in wireless sensor networks. |
VTC Fall (2) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Rolf Blom |
An Optimal Class of Symmetric Key Generation Systems. |
EUROCRYPT |
1984 |
DBLP DOI BibTeX RDF |
|
20 | Alireza T. Boloorchi, Mansur H. Samadzadeh, T. Chen |
Corrigendum to "Symmetric threshold multipath (STM): An online symmetric key management scheme" [Inform. Sci. 268(2014) 489-504]. |
Inf. Sci. |
2014 |
DBLP DOI BibTeX RDF |
|
20 | Alireza T. Boloorchi, Mansur H. Samadzadeh, T. Chen |
Symmetric Threshold Multipath (STM): An online symmetric key management scheme. |
Inf. Sci. |
2014 |
DBLP DOI BibTeX RDF |
|
20 | Matthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
The Long-Short-Key Primitive and Its Applications to Key Security. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Dungara Ram Choudhary, Dev Anshul, Suman Roy 0001, Chandrashekhar Thejaswi P. S. |
Computationally and Resource Efficient Group Key Agreement for Ad Hoc Sensor Networks. |
COMSWARE |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Fengguang An, Xiuzhen Cheng 0001, Jose Manny Rivera, Jiang Li 0009, Z. Cheng |
PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
security, Sensor networks, key management, key distribution |
20 | Emily Shen, Elaine Shi, Brent Waters |
Predicate Privacy in Encryption Systems. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar |
Public Key Cryptography in Sensor Networks - Revisited. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Yevgeniy Dodis, Nelly Fazio |
Public Key Broadcast Encryption for Stateless Receivers. |
Digital Rights Management Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Siguna Müller, Winfried B. Müller |
The Security of Public Key Cryptosystems Based on Integer Factorization. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem |
19 | Mostafa-Sami M. Mostafa, Safia H. Deif, Hisham Abdel Elazeem Ismail Kholidy |
ULTRA GRIDSEC: Peer-to-Peer Computational Grid Middleware Security Using High Performance Symmetric Key Cryptography. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
ULTRA GRIDSEC, TDES, security, Peer-to-Peer, cryptography, Computational, encryption, high-performance, schema, Grid Middleware, symmetric |
19 | Jason Yang, James Goodman 0001 |
Symmetric Key Cryptography on Modern Graphics Hardware. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Satyajit Banerjee, Debapriyay Mukhopadhyay |
Symmetric key based authenticated querying in wireless sensor networks. |
InterSense |
2006 |
DBLP DOI BibTeX RDF |
authenticated querying, pairwise key pre-distribution, perfect and provable security, symmetric and public key cryptography |
19 | A. Murat Fiskiran, Ruby B. Lee |
Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Zulfikar Ramzan, Leonid Reyzin |
On the Round Security of Symmetric-Key Cryptographic Primitives. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Jerome Burke, John McDonald, Todd M. Austin |
Architectural Support for Fast Symmetric-Key Cryptography. |
ASPLOS |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Masayuki Yoshino, Ken Naganuma, Hisayoshi Satoh |
Symmetric Searchable Encryption for Database Applications. |
NBiS |
2011 |
DBLP DOI BibTeX RDF |
indistinguishablity, symmetric-key cryptography, database, security proof, searchable encryption |
19 | Ramon Novales, Neeraj Mittal, Kamil Saraç |
SKAIT: A Parameterized Key Assignment Scheme for Wireless Networks. |
ISPDC |
2010 |
DBLP DOI BibTeX RDF |
confidential communication, symmetric key assignment, key pre-distribution, collusion resistance |
19 | Sakshi Dhall, Saibal K. Pal |
Design of a New Block Cipher Based on Conditional Encryption. |
ITNG |
2010 |
DBLP DOI BibTeX RDF |
avalanche effect, cryptanalytic attacks, Block cipher, rounds, computational efficiency, symmetric key |
19 | Pritam Gajkumar Shah, Xu Huang 0001, Dharmendra Sharma 0001 |
Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks. |
AINA Workshops |
2010 |
DBLP DOI BibTeX RDF |
Symmetric Key Cryptography, Elliptic Curve Diffie Hellman Scheme, Wireless Sensor Networks, Elliptical Curve Cryptography, Scalar multiplication |
19 | Sang-Ho Shin, Geum-Dal Park, Kee-Young Yoo |
A Virtual Three-Dimension Cellular Automata Pseudorandom Number Generator Based on the Moore Neighborhood Method. |
ICIC (2) |
2008 |
DBLP DOI BibTeX RDF |
Symmetric Key Cryptography, Cellular Automata (CA), Pseudorandom Number Generator (PRNG), One-time Pad |
19 | Jens-Peter Kaps |
Chai-Tea, Cryptographic Hardware Implementations of xTEA. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
symmetric key algorithms, TEA, XTEA, FPGA, ASIC, Efficient implementation |
19 | Mohammad Al-Shurman, Seong-Moo Yoo, Bonam Kim |
Distributive Key Management for Mobile Ad Hoc Networks. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
ad hoc networks, threshold cryptography, mobile security, symmetric key, MDS code |
19 | Arshad Noor |
Identity protection factor (IPF). |
IDtrust |
2008 |
DBLP DOI BibTeX RDF |
asymmetric key, identification & authentication, identity protection factor (IPF), shared-secret, authentication, access control, identity management, symmetric key |
19 | Jeff Lewis |
Cryptol: specification, implementation and verification of high-grade cryptographic applications. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
cryptography, specification language, certification, high assurance, symmetric key |
19 | Hyungkyu Lee, Jongwook Han, Kyoil Chung |
Security Architecture for Authentication and Authorization in the Intelligent and Ubiquitous Home Network. |
ICIC (3) |
2007 |
DBLP DOI BibTeX RDF |
Public Key mechanism, Symmetric Key Mechanism, Multi-home roaming, Authentication, Authorization, Certificate, Home network |
19 | Yunru Zhang, Debiao He, Pandi Vijayakumar, Min Luo 0002, Xinyi Huang 0001 |
SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things. |
IEEE Internet Things J. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Awaneesh Kumar Yadav, An Braeken, Manoj Misra |
Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing. |
J. Supercomput. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Liang Ni 0001, Hengsheng Zhou, Yawei Zhang, Xiaoyan Liu, Bingke Gu |
Provably Secure Symmetric-Key Privacy-Preserving authenticated key agreement protocol. |
ICCNS |
2023 |
DBLP DOI BibTeX RDF |
|
19 | An Braeken |
Public key versus symmetric key cryptography in client-server authentication protocols. |
Int. J. Inf. Sec. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Chinmoy Biswas, Ratna Dutta |
Dynamic multi-key FHE in symmetric key setting from LWE without using common reference matrix. |
J. Ambient Intell. Humaniz. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Bo Wei, Weitao Xu, Kai Li 0002, Chengwen Luo 0001, Jin Zhang 0013 |
i2 Key: A Cross-sensor Symmetric Key Generation System Using Inertial Measurements and Inaudible Sound. |
IPSN |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Emy Setyaningsih, Retantyo Wardoyo, Anny Kartika Sari |
Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution. |
Digit. Commun. Networks |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Seyed Farhad Aghili, Amirhossein Adavoudi Jolfaei, Aysajan Abidin |
SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
19 | An Braeken |
Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak. |
Sensors |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Gildas Avoine, Sébastien Canard, Loïc Ferreira |
Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy. |
CT-RSA |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Anwar Ghani, Khwaja Mansoor, Shahid Mehmood, Shehzad Ashraf Chaudhry, Arif Ur Rahman, Malik Najmus Saqib |
Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key. |
Int. J. Commun. Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Gildas Avoine, Sébastien Canard, Loïc Ferreira |
Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
19 | Shweta Arora, Muzzammil Hussain |
Secure Session Key Sharing Using Symmetric Key Cryptography. |
ICACCI |
2018 |
DBLP DOI BibTeX RDF |
|
19 | S. Anagha, Neenu Sebastian, K. Rosebell Paul |
A Comparative Study of Performance and Security Issues of Public Key Cryptography and Symmetric Key Cryptography in Reversible Data Hiding. |
IBICA |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens |
Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices. |
Secur. Commun. Networks |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Prerna Mohit, G. P. Biswas |
Modification of Symmetric-Key DES into Efficient Asymmetric-Key DES using RSA. |
ICTCS |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Zouheir Labbi, Ahmed Maarof, Mohamed Senhadji, Mostafa Belkasmi |
Hybrid Encryption Approach Using Dynamic Key Generation and Symmetric Key Algorithm for RFID Systems. |
NETYS |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Akinori Kawachi, Hirotoshi Takebe, Keisuke Tanaka |
Lower Bounds for Key Length of k-wise Almost Independent Permutations and Certain Symmetric-Key Encryption Schemes. |
IWSEC |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Mohammad Sadeq Dousti, Rasool Jalili |
FORSAKES: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes. |
Adv. Math. Commun. |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Jayagopal Narayanaswamy, Raghav V. Sampangi, Srinivas Sampalli |
HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption. |
ICISSP |
2015 |
DBLP DOI BibTeX RDF |
|
19 | A. Jegatheesan, D. Manimegalai |
Symmetric key management for mobile ad hoc networks using novel secure and authenticated key distribution protocol-revised. |
Int. J. Electron. Secur. Digit. Forensics |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Mohammad Sadeq Dousti, Rasool Jalili |
FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
19 | Prakash Kuppuswamy, Saeed Q. Y. Al-Khalidi |
Hybrid encryption/decryption technique using new public key and symmetric key algorithm. |
Int. J. Inf. Comput. Secur. |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Guangyu Zhu, Gul N. Khan |
Symmetric key based RFID authentication protocol with a secure key-updating scheme. |
CCECE |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Yevgeniy Dodis, Weiliang Luo, Shouhuai Xu, Moti Yung |
Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. |
AsiaCCS |
2012 |
DBLP DOI BibTeX RDF |
|
19 | S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari Bhat |
Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points. |
Int. J. Netw. Secur. |
2011 |
DBLP BibTeX RDF |
|
19 | Asoke Nath, Saima Ghosh, Meheboob Alam Mallick |
Symmetric Key Cryptography Using Random Key Generator. |
Security and Management |
2010 |
DBLP BibTeX RDF |
|
19 | Imran Erguler, Emin Anarim |
A Password-Based Key Establishment Protocol with Symmetric Key Cryptography. |
WiMob |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Tyler Moore 0001, Jolyon Clulow |
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Bruce Christianson |
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
18 | Mikhail J. Atallah, Marina Blanton, Nelly Fazio, Keith B. Frikken |
Dynamic and Efficient Key Management for Access Hierarchies. |
ACM Trans. Inf. Syst. Secur. |
2009 |
DBLP DOI BibTeX RDF |
Efficient key derivation, key management, hierarchical access control |
18 | Jun Zhou, Mingxing He |
An Improved Distributed Key Management Scheme in Wireless Sensor Networks. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
Distributed wireless sensor networks, Key management, Secret sharing, Continuity |
18 | Fan Zhang 0010, Zhijie Jerry Shi, Bing Wang 0001 |
Chord-Based Key Establishment Schemes for Sensor Networks. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Ashok Kumar Das, Indranil Sengupta 0001 |
An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials. |
COMSWARE |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 543 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|