Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

End-to-end encryption

Known as: E2EE, End-to-end 
End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
In recent years, the image and video coding technologies have advanced by leaps and bounds. However, due to the popularization of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2016
Highly Cited
2016
State-of-the-art sequence labeling systems traditionally require large amounts of task-specific knowledge in the form of hand… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 2
  • table 1
Is this relevant?
Highly Cited
2014
Highly Cited
2014
The certificate authority model for authenticating public keys of websites has been attacked in recent years, and several… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Mobile ad hoc routing protocols allow nodes with wireless adaptors to communicate with one another without any pre-existing… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Providing desirable data security, that is, confidentiality, authenticity, and availability, in wireless sensor networks (WSNs… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Structural monitoring---the collection and analysis of structural response to ambient or forced excitation--is an important… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
• Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar. SPINS: Security Protocols for Sensor Networks, Mobicom… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Sensor networks are distributed event-based systems that differ from traditional communication networks in several ways: sensor… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
This paper considers the potentially negative impacts of an increasing deployment of non-congestion-controlled best-effort… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1978
Highly Cited
1978
Abstract : End-to-end encryption is not sufficient to prevent compromise of information in a network that employs untrusted… Expand
Is this relevant?