Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,373,787 papers from all fields of science
Search
Sign In
Create Free Account
Link encryption
Known as:
Bulk encryption
, Multiplex link encryption
Link encryption is an approach to communications security that encrypts and decrypts all traffic at each end of a communications line (e.g. a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Communications security
Encryption
End-to-end encryption
Multiplexing
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q
M. Ariffin
,
M. Asbullah
,
Nur Azman Abu
,
Z. Mahad
2013
Corpus ID: 265095965
In this paper, we introduce a new scheme based on the hardness of factoring integers of the shape ��=�� 2 �� . Our scheme uses a…
Expand
2012
2012
A New Efficient Asymmetric Cryptosystem Based on the Integer Factorization Problem
M. Ariffin
2012
Corpus ID: 16829106
A new asymmetric cryptosystem based on the Integer Factorization Problem is proposed. It posses an encryption and decryption…
Expand
2011
2011
Accelerated Processing of Secure Email by Exploiting Built-in Security Features on the Intel EP80579 Integrated Processor with Intel QuickAssist Technology
V. Keshavamurthy
,
S. Upadhyaya
,
V. Gopal
IEEE 30th Symposium on Reliable Distributed…
2011
Corpus ID: 10106162
Domain Keys Identified Mail (DKIM) is one of the widely used mechanisms by which email messages can be cryptographically signed…
Expand
2009
2009
Accelerating Techniques for Rapid Mitigation of Phishing and Spam Emails
P. Gupta
,
Ajay Nagrale
,
S. Upadhyaya
2009
Corpus ID: 17478874
Spam filters that are implemented using Naïve Bayesian learning techniques are widely deployed worldwide with email clients such…
Expand
2008
2008
The energy cost of SSL in deeply embedded systems
Vishal Gupta
,
M. Wurm
2008
Corpus ID: 16203536
As the number of potential applications for tiny, battery-powered, "mote"-like, deeply embedded devices grows, so does the need…
Expand
2006
2006
Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security
N. Sklavos
,
P. Kitsos
,
K. Papadopoulos
,
O. Koufopavlou
Journal of Supercomputing
2006
Corpus ID: 10252224
Communication protocols for wireless networks have specified security layers, with high-level encryption strength. The dedicated…
Expand
2006
2006
An enterprise policy-based security protocol for protecting relational database network objects
W. Itani
,
A. Kayssi
,
A. Chehab
International Conference on Wireless…
2006
Corpus ID: 2513181
In this paper we present ESCORT, an Enterprise, policy-baSed seCurity prOtocol for protecting relational daTabase network objects…
Expand
2005
2005
A practical implementation of transparent encryption and separation of duties in enterprise databases: protection against external and internal attacks on databases
Ulf T. Mattsson
IEEE Congress on Evolutionary Computation
2005
Corpus ID: 4664574
Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing…
Expand
2005
2005
Trust in trusted computing – the end of security as we know it
Dinesh Kallath
2005
Corpus ID: 62732824
1984
1984
Security Enhancement for Commercial Communication Satellite Systems
O. Hoernig
,
D. Sood
IEEE Military Communications Conference
1984
Corpus ID: 43724984
The telecommunications industry working in consonance with the U.S. government under the direction of the National Security…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE