Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,884,279 papers from all fields of science
Search
Sign In
Create Free Account
End-to-end encryption
Known as:
E2EE
, End-to-end
End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Authentication
Backup
BlackBerry Messenger (BBM)
Certificate authority
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
STEED — Usable End-to-End Encryption
W. Koch
,
Marcus Brinkmann
2011
Corpus ID: 3755822
—End-to-end e-mail encryption is still ignored by almost all users. The mails are left in the clear in the mailboxes of the web…
Expand
Highly Cited
2011
Highly Cited
2011
Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach
Tingting Chen
,
Liehuang Zhu
,
Fan Wu
,
S. Zhong
IEEE Transactions on Vehicular Technology
2011
Corpus ID: 9653260
In vehicular ad hoc networks (VANETs), because of the nonexistence of end-to-end connections, it is essential that nodes take…
Expand
Review
2008
Review
2008
IEEE Communications Surveys & Tutorials - second quarter 2008
Nelson Da Fonseca
IEEE Communications Surveys and Tutorials
2008
Corpus ID: 17315935
2 Welcome to the second IEEE Communications Surveys and Tutorials issue of 2008. The articles in this issue, which we now briefly…
Expand
2008
2008
End – to – End Encryption in the TTSoC Architecture
Armin Wasicek
2008
Corpus ID: 16410316
Current cryptographic techniques pose high computational requirements on the executing system. Particularly in embedded systems…
Expand
Review
2006
Review
2006
Transmission control protocol (TCP) in wireless networks: issues, approaches, and challenges
Ka-Cheong Leung
,
V. Li
IEEE Communications Surveys and Tutorials
2006
Corpus ID: 5542425
The Transmission Control Protocol (TCP) is the most popular transport layer protocol for the Internet. Due to the characteristics…
Expand
2005
2005
SafeSMS - end-to-end encryption for SMS
M. Hassinen
Proceedings of the 8th International Conference…
2005
Corpus ID: 37872704
Our main contribution is confidentiality, in- tegrity and authentication in SMS (Short Message Services). We will show how to…
Expand
Highly Cited
2005
Highly Cited
2005
Joint routing and scheduling in multi-radio multi-channel multi-hop wireless networks
Jihui Zhang
,
Haitao Wu
,
Qian Zhang
,
Bo Li
2nd International Conference on Broadband…
2005
Corpus ID: 29979205
Recent advances in multi-radio multi-channel transmission technology have the potential of substantially improving the system…
Expand
2004
2004
End-to-End Signing and Object Encryption for the Extensible Messaging and Presence Protocol (XMPP)
P. Saint-Andre
Request for Comments
2004
Corpus ID: 40033916
This document describes an end-to-end object encryption method for use in the eXtensible Messaging and Presence Protocol (XMPP).
Highly Cited
2000
Highly Cited
2000
Video staging: a proxy-server-based approach to end-to-end video delivery over wide-area networks
Zhi-Li Zhang
,
Yuewei Wang
,
D. Du
,
Dongli Su
TNET
2000
Corpus ID: 973889
Real-time distribution of stored video over wide-area networks (WANs) is a crucial component of many emerging distributed…
Expand
Highly Cited
1994
Highly Cited
1994
Improving End-to-End Performance of TCP over Mobile Internetworks
Raj Yavatkar
,
N. Bhagawat
First Workshop on Mobile Computing Systems and…
1994
Corpus ID: 15526192
Reliable tronsport protocols such as TCP use end-toendflow, congestion, and error control mechanisms to provide reliable delivery…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE