End-to-end encryption

Known as: E2EE, End-to-end 
End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1978-2017
020040019782017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
During its nascent stages, Programmable Logic Controllers (PLC) were made robust to sustain tough industrial environments, but… (More)
Is this relevant?
2011
2011
End-to-end e-mail encryption is still ignored by almost all users. The mails are left in the clear in the mailboxes of the web… (More)
Is this relevant?
2009
2009
People increasingly depend on the mobile communication networks, specially the third generation of mobile communication network… (More)
  • figure 2
  • figure 3
  • figure 1
  • figure 4
  • figure 5
Is this relevant?
2008
2008
The use of converge-cast traffic and in-network processing to minimize the amount of transmitted data is a frequently used… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Providing desirable data security, that is, confidentiality, authenticity, and availability, in wireless sensor networks (WSNs… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2005
2005
Our main contribution is confidentiality, integrity and authentication in SMS (Short Message Services). We will show how to send… (More)
  • figure 1
  • figure 3
  • figure 2
  • table II
  • table III
Is this relevant?
Highly Cited
2005
Highly Cited
2005
This paper introduces Sizzle, the first fully implemented end-to-end security architecture for highly constrained embedded… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2000
2000
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Thispaperconsidersthepotentiallynegativeimpactsof anincreasingdeploymentof non-congestion-controlled best-efort traffic on the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
1984
1984
A formal specification and verification of a simple secure communications network using end-to-end encryption is presented. It is… (More)
  • figure I
Is this relevant?