Skip to search formSkip to main contentSkip to account menu

Cryptographic protocol

Known as: Cryptographic protocols, Cyptographic protocol, Secure connection 
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Abstract An improved version of the Anshel–Anshel–Goldfeld (AAG) algebraic cryptographic key-exchange scheme, that is in… 
Highly Cited
2017
Highly Cited
2017
Smart cities aim to improve the quality of urban services and their energy efficiency by utilizing information and communication… 
Review
2016
Review
2016
The de-facto standards of the security protocol SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are used to create… 
Review
2014
Review
2014
With testing, a system is executed with a set of selected stimuli, and observed to determine whether its behavior conforms to the… 
Highly Cited
2009
Highly Cited
2009
We show that monogamy of Bell's inequality violations, which is strictly weaker condition than the no-signaling principle is… 
Highly Cited
2008
Highly Cited
2008
Energy is a central concern in the deployment of wireless sensor networks. In this paper, we investigate the energy cost of… 
Highly Cited
2007
Highly Cited
2007
The common random string model introduced by Blum, Feldman, and Micali permits the construction of cryptographic protocols that… 
Highly Cited
2005
Highly Cited
2005
We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret… 
Review
2005
Review
2005
Expanded into two volumes, the Second Edition of Springers Encyclopedia of Cryptography and Security brings the latest and most… 
Highly Cited
2005
Highly Cited
2005
A contactless smartcard is a smartcard that can communicate with other devices without any physical connection, using Radio…