Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,751,234 papers from all fields of science
Search
Sign In
Create Free Account
End-to-end encryption
Known as:
E2EE
, End-to-end
End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Authentication
Backup
BlackBerry Messenger (BBM)
Certificate authority
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
STEED — Usable End-to-End Encryption
W. Koch
,
Marcus Brinkmann
2011
Corpus ID: 3755822
—End-to-end e-mail encryption is still ignored by almost all users. The mails are left in the clear in the mailboxes of the web…
Expand
Highly Cited
2011
Highly Cited
2011
A study and comparison of OLSR, AODV and TORA routing protocols in ad hoc networks
P. Kuppusamy
,
K. Thirunavukkarasu
,
B. Kalaavathi
International Conference on Electronic Computer…
2011
Corpus ID: 16008919
Mobile Ad hoc Network (MANET) is a collection of mobile nodes in which the wireless links are frequently broken down due to…
Expand
Review
2008
Review
2008
IEEE Communications Surveys & Tutorials - second quarter 2008
Nelson Da Fonseca
IEEE Communications Surveys and Tutorials
2008
Corpus ID: 17315935
2 Welcome to the second IEEE Communications Surveys and Tutorials issue of 2008. The articles in this issue, which we now briefly…
Expand
2008
2008
End – to – End Encryption in the TTSoC Architecture
Armin Wasicek
2008
Corpus ID: 16410316
Current cryptographic techniques pose high computational requirements on the executing system. Particularly in embedded systems…
Expand
2005
2005
SafeSMS - end-to-end encryption for SMS
M. Hassinen
Proceedings of the 8th International Conference…
2005
Corpus ID: 37872704
Our main contribution is confidentiality, in- tegrity and authentication in SMS (Short Message Services). We will show how to…
Expand
Highly Cited
2004
Highly Cited
2004
Retransmission policies for concurrent multipath transfer using SCTP multihoming
J. Iyengar
,
P. Amer
,
R. Stewart
ICON
2004
Corpus ID: 15321183
Concurrent multipath transfer (CMT) uses the stream control transmission protocol's (SCTP's) multihoming feature to distribute…
Expand
2002
2002
Performance analysis for ad hoc QoS routing protocols
Irina Gerasimov
,
R. Simon
International Mobility and Wireless Access…
2002
Corpus ID: 11271134
One of the major challenges faced by designers of ad hoc network systems is the deployment of end-to-end quality-of-service…
Expand
Highly Cited
2001
Highly Cited
2001
Mesh-based geocast routing protocols in an ad hoc network
Jeff Boleng
,
T. Camp
,
Vishy Tolety
Proceedings, International Parallel and…
2001
Corpus ID: 15124085
This paper concerns the development and performance evaluation of protocols that provide geocast communication in an ad hoc netw…
Expand
Review
1997
Review
1997
Wideband local access: wireless LAN and wireless ATM
K. Pahlavan
,
A. Zahedi
,
P. Krishnamurthy
IEEE Communications Magazine
1997
Corpus ID: 60932430
An overview of the status of wideband wireless local access technologies is provided. Service scenarios and availability of the…
Expand
1989
1989
End-to-end encryption at the network layer
R. Nelson
[ Proceedings] Fifth Annual Computer Security…
1989
Corpus ID: 9302886
Both network-layer and transport-layer encryption are permitted by the OSI Security Addendum. The advantages of network-layer…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE