Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,232,131 papers from all fields of science
Search
Sign In
Create Free Account
Link encryption
Known as:
Bulk encryption
, Multiplex link encryption
Link encryption is an approach to communications security that encrypts and decrypts all traffic at each end of a communications line (e.g. a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Communications security
Encryption
End-to-end encryption
Multiplexing
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q
M. Ariffin
,
M. Asbullah
,
Nur Azman Abu
,
Z. Mahad
2013
Corpus ID: 265095965
In this paper, we introduce a new scheme based on the hardness of factoring integers of the shape ��=�� 2 �� . Our scheme uses a…
Expand
2012
2012
A New Efficient Asymmetric Cryptosystem Based on the Integer Factorization Problem
M. Ariffin
2012
Corpus ID: 16829106
A new asymmetric cryptosystem based on the Integer Factorization Problem is proposed. It posses an encryption and decryption…
Expand
2009
2009
Accelerating Techniques for Rapid Mitigation of Phishing and Spam Emails
P. Gupta
,
Ajay Nagrale
,
S. Upadhyaya
2009
Corpus ID: 17478874
Spam filters that are implemented using Naïve Bayesian learning techniques are widely deployed worldwide with email clients such…
Expand
2007
2007
A New Approach to Anonymous Multicast Routing in Ad Hoc Networks
L. Bao
Second International Conference on Communications…
2007
Corpus ID: 137475
Anonymity in ad hoc network routing came as a means to hide the identification information of nodes, traffic, paths and network…
Expand
2006
2006
Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security
N. Sklavos
,
P. Kitsos
,
K. Papadopoulos
,
O. Koufopavlou
Journal of Supercomputing
2006
Corpus ID: 10252224
Communication protocols for wireless networks have specified security layers, with high-level encryption strength. The dedicated…
Expand
2005
2005
A practical implementation of transparent encryption and separation of duties in enterprise databases: protection against external and internal attacks on databases
Ulf T. Mattsson
IEEE Congress on Evolutionary Computation
2005
Corpus ID: 4664574
Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing…
Expand
2004
2004
Transparent Encryption and Separation of Duties for Enterprise Databases - A Solution for Field Level Privacy in Databases
Ulf T. Mattsson
2004
Corpus ID: 59731717
Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing…
Expand
2001
2001
Image Compression and Coding
J. Scharinger
Digital Image Analysis
2001
Corpus ID: 53903880
In recent years the processing of multimedia data has experienced a great deal of interest, which is likely to increase even more…
Expand
1997
1997
Infrastructure Management as Cooperative Work: Implications for Systems Design
Robert J. Sandusky
Computer Supported Cooperative Work (CSCW)
1997
Corpus ID: 8287423
This study looks at the data communicationsnetwork management organization (NMO) within alarge financial institution and…
Expand
1983
1983
An integrated multiple transponder TDMA bulk encryption satellite communications system
F. P. Stein
1983
Corpus ID: 108025780
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE