Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,998,329 papers from all fields of science
Search
Sign In
Create Free Account
Cryptographic protocol
Known as:
Cryptographic protocols
, Cyptographic protocol
, Secure connection
Expand
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Alice and Bob
Authentication
Authentication protocol
Batch cryptography
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
The Trust-Based MAC - Layer Security Protocol for Mobile Ad Hoc Networks
A. Rajaram
,
S. Palaniswami
International Conference on Wireless…
2010
Corpus ID: 12958310
In this paper, we develop a trust based security protocol based on a MAC-layer approach which attains confidentiality and…
Expand
Highly Cited
2008
Highly Cited
2008
A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis
Qingling Cai
,
Zhan Yiju
,
Yonghua Wang
ISECS International Colloquium on Computing…
2008
Corpus ID: 5546972
This paper proposes a new security protocol with satisfying the lightweight requirements of the security of RFID system - A…
Expand
Highly Cited
2008
Highly Cited
2008
A study on secure RFID mutual authentication scheme in pervasive computing environment
Sooyoung Kang
,
Deok-Gyu Lee
,
Imyeong Lee
Computer Communications
2008
Corpus ID: 2497889
2007
2007
An energy efficient link-layer security protocol for wireless sensor networks
L.E. Lighfoot
,
Jian Ren
,
Tongtong Li
IEEE International Conference on Electro…
2007
Corpus ID: 10553293
In recent years, wireless sensor networks (WSNs) have found use in a variety of different applications including environmental…
Expand
Highly Cited
2007
Highly Cited
2007
Multichannel Security Protocols
Ford-Long Wong
,
F. Stajano
IEEE pervasive computing
2007
Corpus ID: 2410441
Multichannel security protocols transmit messages over multiple communication channels, taking into account each channel's…
Expand
2007
2007
Low-Cost and Strong-Security RFID Authentication Protocol
JaeCheol Ha
,
S. Moon
,
J. G. Nieto
,
C. Boyd
EUC Workshops
2007
Corpus ID: 16275706
This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database…
Expand
Highly Cited
2005
Highly Cited
2005
The security of VANETs
M. Raya
,
J. Hubaux
International Workshop on VehiculAr Inter…
2005
Corpus ID: 6749562
In this work, we address the security of VANETs. We provide a detailed threat analysis and devise an appropriate security…
Expand
Highly Cited
2005
Highly Cited
2005
A security protocol for sensor networks
Khadija Stewart
,
T. Haniotakis
,
S. Tragoudas
GLOBECOM '05. IEEE Global Telecommunications…
2005
Corpus ID: 14175359
We present in this paper a new security protocol especially suited for sensor networks. This protocol uses a novel encryption…
Expand
2005
2005
ChipLock: support for secure microarchitectures
Taeho Kgil
,
Laura Falk
,
T. Mudge
CARN
2005
Corpus ID: 9213563
The increasing need for security has caused system designers to consider placing some security support directly at the hardware…
Expand
2004
2004
Improving the security of wireless LANs by managing 802.1x disassociation
Ping Ding
,
J. Holliday
,
Aslihan Celik
First IEEE Consumer Communications and Networking…
2004
Corpus ID: 14579295
802.1x is a security protocol based on the frame structure of 802.11. It attempts to provide strong authentication, access…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE