Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Link encryption

Known as: Bulk encryption, Multiplex link encryption 
Link encryption is an approach to communications security that encrypts and decrypts all traffic at each end of a communications line (e.g. a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
In this paper, we introduce a new scheme based on the hardness of factoring integers of the shape ��=�� 2 �� . Our scheme uses a… Expand
  • table 1
  • table 2
  • table 3
  • table 4
Highly Cited
2008
Highly Cited
2008
Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of which have been extensively… Expand
  • figure 1
2007
2007
In this paper we present XPRIDE as an efficient security architecture for assuring the confidentiality and integrity of the XML… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 2
2006
2006
In this paper we present PRIDE (Policy-driven web secuRity for handheld wireless DEvices) as an efficient security architecture… Expand
  • figure 1.3
  • figure 1.3
  • figure 1.3
  • table 1.4
  • figure 2.1
2005
2005
  • Ulf T. Mattsson
  • Seventh IEEE International Conference on E…
  • 2005
  • Corpus ID: 4664574
Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing… Expand
Highly Cited
2000
Highly Cited
2000
Abstract We describe some general relations between cryptographic and abstracted security definitions, and we present a novel… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
1998
Highly Cited
1998
To guarantee security and privacy in image and video archival applications, efficient bulk encryption techniques are necessary… Expand
Highly Cited
1996
Highly Cited
1996
This paper describes an architecture, Onion Routing, that limits a network's vulnerability to traffic analysis. The architecture… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
1992
Highly Cited
1992
This paper describes KryptoKnight, an authentication and key distribution system that provides facilities for secure… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
1984
1984
  • O. Hoernig, D. Sood
  • MILCOM - IEEE Military Communications Conference
  • 1984
  • Corpus ID: 43724984
The telecommunications industry working in consonance with the U.S. government under the direction of the National Security… Expand