Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,467 papers from all fields of science
Search
Sign In
Create Free Account
Opportunistic encryption
Known as:
Oe
Opportunistic encryption (OE) refers to any system that, when connecting to another system, attempts to encrypt the communications channel otherwise…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
35 relations
Certificate authority
Crypto-anarchism
Cypherpunk
DNS-based Authentication of Named Entities
Expand
Broader (1)
Internet privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Opportunistic Encryption for HTTP URIs
M. Nottingham
,
M. Thomson
2014
Corpus ID: 62919418
This describes how "http" URIs can be accessed using Transport Layer Security (TLS) to mitigate pervasive monitoring attacks.
2012
2012
Opportunistic multihop wireless communications with calibrated channel model
P. Spachos
,
Liang Song
,
D. Hatzinakos
IEEE International Conference on Communications…
2012
Corpus ID: 13531276
Opportunistic routing schemes have been studied over the past decade to provide better performance in multihop wireless networks…
Expand
2011
2011
Simple encryption algorithm with improved performance in wireless communications
M. Matalgah
,
Amer M. Magableh
IEEE Radio and Wireless Symposium
2011
Corpus ID: 6129057
In this paper, inspired by network coding theory we propose an efficient hybrid encryption-coding algorithm that requires using…
Expand
2011
2011
Alleviating the effect of the strict avalanche criterion (SAC) of symmetric-key encryption in wireless communication channels
M. Matalgah
,
Walid Y. Zibideh
,
Amer M. Magableh
International Conference on Communications and…
2011
Corpus ID: 17000144
The strict avalanche criterion (SAC) is a desirable property of traditional symmetric-key cryptographic algorithms. The SAC is…
Expand
2008
2008
Private Use of Untrusted Web Servers via Opportunistic Encryption
Mihai Christodorescu
2008
Corpus ID: 15551537
Users clamor for online services hosted on remote web servers. As a result, there is a growing concern about the security and…
Expand
2007
2007
FAOT KANAF-OE KANAF SEBAGAI REPRESENTASI ETOS LINGKUNGAN : Kajian Etnoekologi tentang Kearifan Lokal Masyarakat Adat Atoni Pah Meto di Timor Barat-Provinsi Nusa Tenggara Timur
Blajan Konradus
2007
Corpus ID: 194754600
Disertasi dengan judul Faot knaf-0e Kanaf sebagai Representasi Etos Lingkungan ini sesungguhnya berawal dari minat penulis untuk…
Expand
2002
2002
IPv6 Opportunistic Encryption
C. Castelluccia
,
G. Montenegro
2002
Corpus ID: 64886555
This paper presents an Opportunistic Encryption scheme for IPv6. Our proposal relies on IPv6 Anycast, Authorization certificates…
Expand
1998
1998
Darvantara Solaram, oe the Rhetoric of Charm in the poetry of Olga Orozco
M. Nicholson
1998
Corpus ID: 191004228
Olga Orozco (b. 1920), widely recognized as one of Argentina's leading contemporary writers, inscribes herself within a tradition…
Expand
1973
1973
Two examples illustrating the differences between classical and quantum mechanics
J. Rauch
,
M. Reed
1973
Corpus ID: 55019201
Two examples are presented: The first shows that a potentialV(x) can be in the limit circle case at ∞ even if the classical…
Expand
1953
1953
The genetics oe luxate mice
T. Carter
Journal Genetika
1953
Corpus ID: 30450812
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE