Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,190,166 papers from all fields of science
Search
Sign In
Create Free Account
Cryptographic protocol
Known as:
Cryptographic protocols
, Cyptographic protocol
, Secure connection
Expand
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Alice and Bob
Authentication
Authentication protocol
Batch cryptography
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
An energy-efficient and security aware route selection protocol for wireless sensor networks
T. Hayajneh
,
Razvi Doomun
,
G. Al-Mashaqbeh
,
B. Mohd
Secur. Commun. Networks
2014
Corpus ID: 23236521
In wireless sensor networks WSNs, sensor devices have limited supply of energy. The sensor death due to dissipating battery…
Expand
2013
2013
On the Trade-Off Between Security and Energy Efficiency in Cooperative Spectrum Sensing for Cognitive Radio
S. Althunibat
,
V. Sucasas
,
Hugo Marques
,
Jonathan Rodriguez
,
R. Tafazolli
,
F. Granelli
IEEE Communications Letters
2013
Corpus ID: 17424528
Cooperative spectrum sensing is envisaged to increase reliability in cognitive radio networks. Several users cooperate to detect…
Expand
Review
2011
Review
2011
The Evolution of RFID Security and Privacy: A Research Survey
R. Pateriya
,
Sangeeta Sharma
International Conference on Communication Systems…
2011
Corpus ID: 16780531
This paper presents the recent technical research on the problems of privacy and security for radio frequency identification…
Expand
Highly Cited
2011
Highly Cited
2011
Design and evaluation of Oasis: An active storage framework based on T10 OSD standard
Yulai Xie
,
Kiran-Kumar Muniswamy-Reddy
,
+4 authors
Zhipeng Tan
IEEE Conference on Mass Storage Systems and…
2011
Corpus ID: 23210841
In this paper, we present the design and performance evaluation of Oasis, an active storage framework for object-based storage…
Expand
Highly Cited
2008
Highly Cited
2008
A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis
Qingling Cai
,
Zhan Yiju
,
Yonghua Wang
ISECS International Colloquium on Computing…
2008
Corpus ID: 5546972
This paper proposes a new security protocol with satisfying the lightweight requirements of the security of RFID system - A…
Expand
2007
2007
Low-Cost and Strong-Security RFID Authentication Protocol
JaeCheol Ha
,
S. Moon
,
J. G. Nieto
,
C. Boyd
EUC Workshops
2007
Corpus ID: 16275706
This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database…
Expand
2005
2005
ChipLock: support for secure microarchitectures
Taeho Kgil
,
Laura Falk
,
T. Mudge
CARN
2005
Corpus ID: 9213563
The increasing need for security has caused system designers to consider placing some security support directly at the hardware…
Expand
Highly Cited
2005
Highly Cited
2005
The security of VANETs
M. Raya
,
J. Hubaux
International Workshop on VehiculAr Inter…
2005
Corpus ID: 6749562
In this work, we address the security of VANETs. We provide a detailed threat analysis and devise an appropriate security…
Expand
Highly Cited
2004
Highly Cited
2004
On using reputations in ad hoc networks to counter malicious nodes
Prashant Dewan
,
P. Dasgupta
,
A. Bhattacharya
Proceedings. Tenth International Conference on…
2004
Corpus ID: 2566652
Nodes in mobile ad hoc networks have a limited transmission range. Hence the nodes expect their neighbors to relay packets meant…
Expand
Review
1998
Review
1998
Security at the Internet Layer
R. Oppliger
Computer
1998
Corpus ID: 206411487
The Internet Engineering Task Force is standardizing security protocols (IPsec protocols) that are compatible with IPv6 and can…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE