Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Opportunistic encryption

Known as: Oe 
Opportunistic encryption (OE) refers to any system that, when connecting to another system, attempts to encrypt the communications channel otherwise… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Device-to-Device communications represent a paradigm shift in cellular networks. Analytical results on D2D performance are very… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
Many of the core Internet protocols were designed for a less hostile network than the average packet finds itself in today. Many… Expand
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2005
2005
This document describes opportunistic encryption (OE) as designed and implemented by the Linux FreeS/WAN project. OE uses the… Expand
  • figure 6
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Is adaptive scaffolding effective in facilitating students ability to regulate their learning of complex science topics with… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Construction claims are considered by many project participants to be one of the most disruptive and unpleasant events of a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2004
2004
This paper presents an opportunistic encryption scheme strictly layered on top of IPv6. Assuming that a node needs to send data… Expand
  • figure 1
Is this relevant?
2002
2002
This paper presents an Opportunistic Encryption scheme for IPv6. Our proposal relies on IPv6 Anycast, Authorization certificates… Expand
Is this relevant?
1999
1999
Much electronic mail is sent unencrypted, making it vulnerable to passive eavesdropping. We propose to protect email privacy by… Expand
  • table 1
  • table 2
  • table 3
Is this relevant?
1989
1989
Reference EPFL-ARTICLE-169143View record in Web of Science Record created on 2011-09-29, modified on 2017-11-27 
Is this relevant?