Communications security

Known as: Secure communications, COMSEC, Communication security 
Communications Security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1974-2018
02040608019742018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
The Internet of Things (IoT) will feature pervasive sensing and control capabilities via a massive deployment of machine-type… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2015
2015
Proximity Services (ProSe) discovery or communications using LTE-based Device-to-Device (D2D) communications have been recently… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
2010
2010
Wireless communication security is addressed using device-specific RF-DNA fingerprints in a localized regional air monitor. The… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2006
Highly Cited
2006
  • 2006
This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions… (More)
  • figure 1
  • figure 2
Is this relevant?
2005
2005
The book is aimed at bridging the gap between cryptography and its standard applications. From my point of view, it has achieved… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Details of a planning study for USAF computer security requirements are presented. An Advanced development and Engineering… (More)
Is this relevant?
Highly Cited
1994
Highly Cited
1994
computer communications security principles standard protocols and techniques What to say and what to do when mostly your friends… (More)
Is this relevant?
Highly Cited
1983
Highly Cited
1983
The implications of adding security mechanisms to high-level network protocols operating in an open-system environment are… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1978
Highly Cited
1978
According to traditional conceptions of cryptographic security, it is necessary to transmit a key, by secret means, before… (More)
Is this relevant?