Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,238,997 papers from all fields of science
Search
Sign In
Create Free Account
Null encryption
In modern cryptology, null encryption (or selecting null cipher or NONE cipher) is choosing not to use encryption in a system where various…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Null cipher
OpenSSL
TLS-PSK
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Implementation of Secure Communication With Modbus and Transport Layer Security protocols
Matheus K. Ferst
,
Hugo F. M. de Figueiredo
,
G. Denardin
,
Juliano Lopes
IEEE International Conference on Industry…
2018
Corpus ID: 59526993
Industrial Control Systems (ICS) and Supervisory Control systems and Data Acquisition (SCADA) networks implement industrial…
Expand
Review
2018
Review
2018
Security and Protocol Exploit Analysis of the 5G Specifications
Roger Piqueras Jover
,
V. Marojevic
IEEE Access
2018
Corpus ID: 52304593
The third generation partnership project released its first 5G security specifications in March 2018. This paper reviews the…
Expand
2015
2015
Hickory dickory doc
George Neville-Neil
Communications of the ACM
2015
Corpus ID: 40743782
On null encryption and automated documentation.
2012
2012
Evaluation of robust header compression for aeronautical operational data
T. Tordjman
,
O. Lücke
6th Advanced Satellite Multimedia Systems…
2012
Corpus ID: 15388009
Integrated systems for provision of both operational and non-operational services are investigated in SANDRA (Seamless…
Expand
2008
2008
XESP for Traffic Visibility
K. Grewal
2008
Corpus ID: 64014552
This document describes leveraging UDP encapsulation for IPsec, using ESP NULL encryption in order for intermediary devices to…
Expand
2007
2007
Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for Transport Layer Security (TLS)
U. Blumenthal
,
Purushottam Goel
Request for Comments
2007
Corpus ID: 37688345
This document specifies authentication-only ciphersuites (with no encryption) for the Pre-Shared Key (PSK) based Transport Layer…
Expand
2007
2007
The methods and apparatus which have a null encryption for signaling and media packets between the mobile station and the secure gateway
シュ、レイモンド・ター−シェン
,
マヘンドラン、アルングンドラム・シー.
2007
Corpus ID: 149727201
Disclosed is a method for efficient transport of packets between a mobile station and a secure gateway over a wireless local area…
Expand
2007
2007
Having a null encryption method and apparatus for signaling and media packets between the mobile station and the security gateway
A·C·马亨德兰
,
徐大生
2007
Corpus ID: 108339107
It discloses a method of accessing a home service for efficiently transmitting packets between the mobile station and the…
Expand
2004
2004
Lawful interception based on sniffers in next generation networks
A. Rojas
,
P. Branch
2004
Corpus ID: 18595307
Today, the function of Lawful Interception (LI) in IP service networks is typically performed by systems which are based on the…
Expand
Highly Cited
1998
Highly Cited
1998
The NULL Encryption Algorithm and Its Use With IPsec
R. Glenn
,
S. Kent
Request for Comments
1998
Corpus ID: 10699054
This memo defines the NULL encryption algorithm and its use with the IPsec Encapsulating Security Payload (ESP). NULL does…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE