Skip to search formSkip to main contentSkip to account menu

Cryptographic protocol

Known as: Cryptographic protocols, Cyptographic protocol, Secure connection 
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The resource constrained characteristic of M2M systems has made secure channel establishment for sensor data communication a… 
2011
2011
In this paper, we present an approach to enable collaborative endpoint network for mobile phones. In particular, we expose… 
2009
2009
IEEE 802.16, known as WiMax, is at the top of communication technology drive because it is gaining a great position in the next… 
Review
2009
Review
2009
Vehicular ad hoc networks(VANET) is the most widely used realization of mobile ad hoc networks(MANET). On demand set up, fault… 
2007
2007
— Electronic voting (E-voting) using an internet has been recently performed in some nations and regions. There is no spatial… 
2005
2005
This paper argues that the existing model-driven architecture paradigm does not adequately cover the visual modeling of security… 
2004
2004
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have… 
Review
2003
Review
2003
This paper is a survey on the twenty years development of security protocols research. The state of the art in the application of… 
2003
2003
Summary form only given. When one begins to think about security and P2P networks, and in particular, ad-hoc P2P networks with no… 
1997
1997
  • S. Brackin
  • 1997
  • Corpus ID: 36956168
This paper describes a simple interface specification language (ISL) for cryptographic protocols and their desired properties…