Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 209,966,059 papers from all fields of science
Search
Sign In
Create Free Account
Link encryption
Known as:
Bulk encryption
, Multiplex link encryption
Link encryption is an approach to communications security that encrypts and decrypts all traffic at each end of a communications line (e.g. a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Communications security
Encryption
End-to-end encryption
Multiplexing
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q
M. Ariffin
2013
Corpus ID: 16829106
In this paper, we introduce a new scheme based on the hardness of factoring integers of the shape ��=�� 2 �� . Our scheme uses a…
Expand
2011
2011
A Secure and Robust Connectivity Architecture for Smart Devices and Applications
T. Shon
,
Kyusuk Han
,
J. Park
,
Y. Jeong
,
Yang Sun Lee
EURASIP Journal on Wireless Communications and…
2011
Corpus ID: 8392752
Convergence environments and technologies are urgently coming close to our life with various wireless communications and smart…
Expand
Highly Cited
2008
Highly Cited
2008
Scalable and efficient provable data possession
G. Ateniese
,
R. D. Pietro
,
L. Mancini
,
G. Tsudik
IACR Cryptology ePrint Archive
2008
Corpus ID: 207170639
Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of which have been extensively…
Expand
2006
2006
Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security
N. Sklavos
,
P. Kitsos
,
K. Papadopoulos
,
O. Koufopavlou
Journal of Supercomputing
2006
Corpus ID: 10252224
Communication protocols for wireless networks have specified security layers, with high-level encryption strength. The dedicated…
Expand
2005
2005
A practical implementation of transparent encryption and separation of duties in enterprise databases: protection against external and internal attacks on databases
Ulf T. Mattsson
IEEE Congress on Evolutionary Computation
2005
Corpus ID: 4664574
Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing…
Expand
Highly Cited
2004
Highly Cited
2004
An FPGA implementation of a GF(p) ALU for encryption processors
A. Daly
,
W. Marnane
,
T. Kerins
,
E. Popovici
Microprocessors and microsystems
2004
Corpus ID: 20803324
Highly Cited
1999
Highly Cited
1999
Cryptographic Security of Reactive Systems
B. Pfitzmann
,
M. Schunter
,
M. Waidner
Workshop on Secure Architectures and Information…
1999
Corpus ID: 205960
Highly Cited
1997
Highly Cited
1997
Fast encryption of image data using chaotic Kolmogorov flows
J. Scharinger
Electronic imaging
1997
Corpus ID: 32394479
To guarantee security and privacy in image transmission and archival applications, adequate efficient bulk encryption techniques…
Expand
Highly Cited
1996
Highly Cited
1996
Hiding Routing Information
D. Goldschlag
,
M. Reed
,
P. Syverson
Information Hiding
1996
Corpus ID: 21154456
This paper describes an architecture, Onion Routing, that limits a network's vulnerability to traffic analysis. The architecture…
Expand
Highly Cited
1992
Highly Cited
1992
KryptoKnight Authentication and Key Distribution System
R. Molva
,
G. Tsudik
,
E. V. Herreweghen
,
S. Zatti
European Symposium on Research in Computer…
1992
Corpus ID: 2003534
This paper describes KryptoKnight, an authentication and key distribution system that provides facilities for secure…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE