Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,540,184 papers from all fields of science
Search
Sign In
Create Free Account
Cryptographic protocol
Known as:
Cryptographic protocols
, Cyptographic protocol
, Secure connection
Expand
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Alice and Bob
Authentication
Authentication protocol
Batch cryptography
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Auth-Lite: Lightweight M2MAuthentication reinforcing DTLS for CoAP
Arijit Ukil
,
S. Bandyopadhyay
,
Abhijan Bhattacharyya
,
A. Pal
,
Tulika Bose
IEEE International Conference on Pervasive…
2014
Corpus ID: 17316137
The resource constrained characteristic of M2M systems has made secure channel establishment for sensor data communication a…
Expand
2011
2011
COFOCUS - Compact and Expanded Restful Services for Mobile Environments
Li Li
,
W. Chou
International Conference on Web Information…
2011
Corpus ID: 37060634
In this paper, we present an approach to enable collaborative endpoint network for mobile phones. In particular, we expose…
Expand
2009
2009
Performance of WiMAX Security Algorithm (The Comparative Study of RSA Encryption Algorithm with ECC Encryption Algorithm)
Masood Habib
,
T. Mehmood
,
Fasee Ullah
,
M. Ibrahim
International Conference on Computer Technology…
2009
Corpus ID: 10920223
IEEE 802.16, known as WiMax, is at the top of communication technology drive because it is gaining a great position in the next…
Expand
Review
2009
Review
2009
A survey on securing user authentication in vehicular ad hoc networks
Mrs. Arzoo Dahiya
,
Mr. Vaibhav Sharma
2009
Corpus ID: 17471638
Vehicular ad hoc networks(VANET) is the most widely used realization of mobile ad hoc networks(MANET). On demand set up, fault…
Expand
2007
2007
Electronic Voting System using Mobile Terminal
Keonwoo Kim
,
Dowon Hong
2007
Corpus ID: 5882295
— Electronic voting (E-voting) using an internet has been recently performed in some nations and regions. There is no spatial…
Expand
2005
2005
Visual security protocol modeling
J. McDermott
New Security Paradigms Workshop
2005
Corpus ID: 16707974
This paper argues that the existing model-driven architecture paradigm does not adequately cover the visual modeling of security…
Expand
2004
2004
PEACE : a policy-based establishment of ad-hoc communities
S. Keoh
,
Emil C. Lupu
,
M. Sloman
Asia-Pacific Computer Systems Architecture…
2004
Corpus ID: 8856988
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have…
Expand
Review
2003
Review
2003
Twenty Years Development of Security Protocols Research
Qing Si
2003
Corpus ID: 63168553
This paper is a survey on the twenty years development of security protocols research. The state of the art in the application of…
Expand
2003
2003
Enterprise strength security on a JXTA P2P network
B. Yeager
International Conference on Peer-to-Peer…
2003
Corpus ID: 206521246
Summary form only given. When one begins to think about security and P2P networks, and in particular, ad-hoc P2P networks with no…
Expand
1997
1997
An interface specification language for automatically analyzing cryptographic protocols
S. Brackin
Proceedings of SNDSS '97: Internet Society…
1997
Corpus ID: 36956168
This paper describes a simple interface specification language (ISL) for cryptographic protocols and their desired properties…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE