Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Link encryption

Known as: Bulk encryption, Multiplex link encryption 
Link encryption is an approach to communications security that encrypts and decrypts all traffic at each end of a communications line (e.g. a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
In this paper, we introduce a new scheme based on the hardness of factoring integers of the shape ��=�� 2 �� . Our scheme uses a… Expand
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2007
2007
In this paper we present XPRIDE as an efficient security architecture for assuring the confidentiality and integrity of the XML… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 2
Is this relevant?
2006
2006
Communication protocols for wireless networks have specified security layers, with high-level encryption strength. The dedicated… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
  • Ulf T. Mattsson
  • Seventh IEEE International Conference on E…
  • 2005
  • Corpus ID: 4664574
Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Abstract Secure electronic and internet transactions require public key cryptosystems to establish and distribute shared secret… Expand
Is this relevant?
2004
2004
One of the fundamental challenges for the designers of the crypto processors is to provide the bulk encryption for network… Expand
  • figure 2
  • figure 1
  • table I
  • figure 5
  • figure 3
Is this relevant?
2004
2004
Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot… Expand
  • figure 1
  • figure 2
Is this relevant?
2001
2001
In recent years the processing of multimedia data has experienced a great deal of interest, which is likely to increase even more… Expand
Is this relevant?
Highly Cited
1998
Highly Cited
1998
To guarantee security and privacy in image and video archival applications, efficient bulk encryption techniques are necessary… Expand
Is this relevant?