Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

End-to-end encryption

Known as: E2EE, End-to-end 
End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
We tackle the problem of large scale visual place recognition, where the task is to quickly and accurately recognize the location… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Highly Cited
2016
Highly Cited
2016
State-of-the-art sequence labeling systems traditionally require large amounts of task-specific knowledge in the form of hand… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 2
  • table 1
Highly Cited
2016
Highly Cited
2016
We show that an end-to-end deep learning approach can be used to recognize either English or Mandarin Chinese speech-two vastly… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
  • table 3
Highly Cited
2015
Highly Cited
2015
Conversational modeling is an important task in natural language understanding and machine intelligence. Although previous… Expand
  • figure 1
Review
2011
Review
2011
Vehicular networking has significant potential to enable diverse applications associated with traffic safety, traffic efficiency… Expand
  • table II
  • table I
  • table III
  • table VI
  • table V
Highly Cited
2009
Highly Cited
2009
Mobile ad hoc routing protocols allow nodes with wireless adaptors to communicate with one another without any pre-existing… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Highly Cited
2004
Highly Cited
2004
Structural monitoring---the collection and analysis of structural response to ambient or forced excitation--is an important… Expand
Highly Cited
2002
Highly Cited
2002
Sensor networks are distributed event-based systems that differ from traditional communication networks in several ways: sensor… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Highly Cited
1999
Highly Cited
1999
This paper considers the potentially negative impacts of an increasing deployment of non-congestion-controlled best-effort… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
1978
Highly Cited
1978
Abstract : End-to-end encryption is not sufficient to prevent compromise of information in a network that employs untrusted… Expand