SKC

(redirected from Symmetric key cryptography)
Also found in: Dictionary, Encyclopedia, Wikipedia.
Category filter:
AcronymDefinition
SKCStudentski Kulturni Centar (Serbian cultural center)
SKCSecret Key Cryptography
SKCSerialized Key Control
SKCSymmetric Key Certificates
SKCSun Knowledge Connection
SKCSymmetric Key Cryptography
SKCSalish Kootenai College (Pablo, MT)
SKCSky Clear (Meteorology)
SKCSwedish Kennel Club (dog club)
SKCSingapore Kendo Club (martial arts; Singapore)
SKCChief Storekeeper (Naval Rating)
SKCSingapore Kennel Club
SKCSt Kevin's College (Melbourne, Victoria-Australia)
SKCSingle Knee to Chest (exercise)
SKCSafety-Kleen Corporation
SKCSouthern Kitty Computing (Sanger, TX)
SKCSteveston Kendo Club (martial arts; Canada)
SKCSafe Kids Canada (est. 1992)
SKCSession Key Changeover
SKCScientist Killing Club (game clan)
SKCScientific Kit Corporation (Pennsylvania)
SKCSauvegarde Karaté Club (France)
SKCSweet Karam Coffee
Copyright 1988-2018 AcronymFinder.com, All rights reserved.
References in periodicals archive ?
(1) Sec-DPoS is the first approach of deduplicatable proof of storage based on symmetric key cryptography and is a secure and highly efficient deduplicatable proof of storage scheme with ensuring confidentiality.
[21] proposed a highly efficient PDP scheme based on symmetric key cryptography, with the support of a dynamic scenario except insertion.
As illustrated above, we achieve both the goal of secure client-side cross-user deduplication and integrity auditing based on symmetric key cryptography. In our construction, the cloud server can save both storage space and network bandwidth while efficiently ensuring data integrity and confidentiality.
Most of the key management protocols for WSNs are based on symmetric key cryptography because public key cryptographic techniques are in general computationally intensive.
End-to-end security: The major merit of symmetric key cryptography is its computational efficiency.
Symmetric key cryptography, which uses the same key to encrypt/decrypt messages, is very efficient on typical sensor nodes [1].
All the cryptographic modules, used in SD-EI VER-2 method, use the same password (key) for both encryption and decryption (as in case of symmetric key cryptography).
In Symmetric Key Cryptography [16], only one key is used for encryption purpose and the same key is used for decryption purpose as well.
All the cryptographic modules, used in SD-AIES method, use the same password (key) for both encryption and decryption (as in case of symmetric key cryptography).
Full browser ?