Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,655,490 papers from all fields of science
Search
Sign In
Create Free Account
Opportunistic encryption
Known as:
Oe
Opportunistic encryption (OE) refers to any system that, when connecting to another system, attempts to encrypt the communications channel otherwise…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
35 relations
Certificate authority
Crypto-anarchism
Cypherpunk
DNS-based Authentication of Named Entities
Expand
Broader (1)
Internet privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
An SDR-based experimental study of outband D2D communications
A. Asadi
,
V. Mancuso
,
Rohit Gupta
IEEE INFOCOM - The 35th Annual IEEE…
2016
Corpus ID: 7494555
Device-to-Device communications represent a paradigm shift in cellular networks. Analytical results on D2D performance are very…
Expand
2009
2009
Opportunistic Encryption Everywhere
A. Langley
2009
Corpus ID: 18972609
Many of the core Internet protocols were designed for a less hostile network than the average packet finds itself in today. Many…
Expand
Highly Cited
2007
Highly Cited
2007
Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks
M. A. Haleem
,
C. N. Mathur
,
R. Chandramouli
,
K.P. Subbalakshmi
IEEE Transactions on Dependable and Secure…
2007
Corpus ID: 1699346
Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into…
Expand
Highly Cited
2004
Highly Cited
2004
Does adaptive scaffolding facilitate students ability to regulate their learning with hypermedia? q
R. Azevedo
,
J. Cromley
,
D. Seibert
2004
Corpus ID: 61370320
Highly Cited
2004
Highly Cited
2004
ANALYTICAL MODEL FOR ANALYZING CONSTRUCTION CLAIMS AND OPPORTUNISTIC BIDDING
S. Ho
,
Liang Y. Liu
2004
Corpus ID: 85538977
Construction claims are considered by many project participants to be one of the most disruptive and unpleasant events of a…
Expand
2004
2004
Hindering Eavesdropping via IPv6 Opportunistic Encryption
C. Castelluccia
,
G. Montenegro
,
J. Laganier
,
C. Neumann
ESORICS
2004
Corpus ID: 17256072
This paper presents an opportunistic encryption scheme strictly layered on top of IPv6. Assuming that a node needs to send data…
Expand
2002
2002
IPv6 Opportunistic Encryption
C. Castelluccia
,
G. Montenegro
2002
Corpus ID: 64886555
This paper presents an Opportunistic Encryption scheme for IPv6. Our proposal relies on IPv6 Anycast, Authorization certificates…
Expand
1999
1999
ssmail: Opportunistic Encryption in sendmail
Damian Bentley
,
Gregory G. Rose
,
Tara Whalen
LISA
1999
Corpus ID: 1108413
Much electronic mail is sent unencrypted, making it vulnerable to passive eavesdropping. We propose to protect email privacy by…
Expand
1989
1989
Deformation Mechanisms In Naturally Deformed Glaucophanes - A Tem And Hrem Study
B. Reynard
,
P. Gillet
,
C. Willaime
1989
Corpus ID: 127905753
Reference EPFL-ARTICLE-169143View record in Web of Science Record created on 2011-09-29, modified on 2017-11-27
1989
1989
The kinetics of dehydration and order-disorder of molecular H20 in Mg-cordierite
C. Giampaolo
,
A. Putnis
1989
Corpus ID: 131977513
The kinetics of water loss in synthetic, hydrated Mg-cordierite has been studied between 336 oe and 687 oe by thermogravimetry…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE