Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,268,535 papers from all fields of science
Search
Sign In
Create Free Account
Opportunistic encryption
Known as:
Oe
Opportunistic encryption (OE) refers to any system that, when connecting to another system, attempts to encrypt the communications channel otherwise…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
35 relations
Certificate authority
Crypto-anarchism
Cypherpunk
DNS-based Authentication of Named Entities
Expand
Broader (1)
Internet privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Stable Throughput Regions of Opportunistic NOMA and Cooperative NOMA With Full-Duplex Relaying
Yong Zhou
,
V. Wong
,
R. Schober
IEEE Transactions on Wireless Communications
2018
Corpus ID: 52005652
In this paper, we consider downlink non-orthogonal multiple access (NOMA) transmission with dynamic traffic arrival for spatially…
Expand
2016
2016
An SDR-based experimental study of outband D2D communications
A. Asadi
,
V. Mancuso
,
Rohit Gupta
IEEE INFOCOM - The 35th Annual IEEE…
2016
Corpus ID: 7494555
Device-to-Device communications represent a paradigm shift in cellular networks. Analytical results on D2D performance are very…
Expand
2016
2016
Rare cause of dysphagia: A case report of oesophageal fibrovascular polyp.
M. Yusof
,
Z. A. Rahman
,
Rohaya Muda
,
M. Sarif
2016
Corpus ID: 78437917
Abstract: Fibrovascular polyp is a benign, pedunculated and intraluminal tumour of the oesophagus. The symptoms develop when the…
Expand
2009
2009
Opportunistic Encryption Everywhere
Adam Langley
2009
Corpus ID: 18972609
Many of the core Internet protocols were designed for a less hostile network than the average packet finds itself in today. Many…
Expand
2005
2005
Stability of Leapfrog Constant-Coefficients Semi-Implicit Schemes for the Fully Elastic System of Euler Equations: Case with Orography
P. Bénard
,
J. Masek
,
Petra Smolíková
2005
Corpus ID: 34903206
The stability of constant-coefficients semi-implicit schemes for the hydrostatic primitive equations and the fully elastic Euler…
Expand
2002
2002
IPv6 Opportunistic Encryption
C. Castelluccia
,
G. Montenegro
2002
Corpus ID: 64886555
This paper presents an Opportunistic Encryption scheme for IPv6. Our proposal relies on IPv6 Anycast, Authorization certificates…
Expand
1999
1999
ssmail: Opportunistic Encryption in sendmail
Damian Bentley
,
Gregory G. Rose
,
Tara Whalen
LiSA
1999
Corpus ID: 1108413
Much electronic mail is sent unencrypted, making it vulnerable to passive eavesdropping. We propose to protect email privacy by…
Expand
1989
1989
Deformation Mechanisms In Naturally Deformed Glaucophanes - A Tem And Hrem Study
B. Reynard
,
P. Gillet
,
C. Willaime
1989
Corpus ID: 127905753
Reference EPFL-ARTICLE-169143View record in Web of Science Record created on 2011-09-29, modified on 2017-11-27
1989
1989
The kinetics of dehydration and order-disorder of molecular H20 in Mg-cordierite
C. Giampaolo
,
A. Putnis
1989
Corpus ID: 131977513
The kinetics of water loss in synthetic, hydrated Mg-cordierite has been studied between 336 oe and 687 oe by thermogravimetry…
Expand
1973
1973
Two examples illustrating the differences between classical and quantum mechanics
J. Rauch
,
M. Reed
1973
Corpus ID: 55019201
Two examples are presented: The first shows that a potentialV(x) can be in the limit circle case at ∞ even if the classical…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE