Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,851,386 papers from all fields of science
Search
Sign In
Create Free Account
Pretty Good Privacy
Known as:
Openpgp
, Pretty Good protection
, PrettyGoodPrivacy
Expand
Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is often used…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
40-bit encryption
56-bit encryption
Android Privacy Guard
Authentication
Expand
Broader (1)
Privacy software
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Endophytic and rhizoplane bacteria associated with Cytisus striatus growing on hexachlorocyclohexane-contaminated soil: isolation and characterisation
C. Becerra-Castro
,
P. Kidd
,
Á. Prieto-Fernández
,
N. Weyens
,
M. Acea
,
J. Vangronsveld
Plant and Soil
2011
Corpus ID: 44745555
Inoculation of plants with their associated microorganisms is a promising strategy for improving phytoremediation of organic…
Expand
2008
2008
Design of Fully Deniable Authentication Service for E-mail Applications
L. Harn
,
Jian Ren
IEEE Communications Letters
2008
Corpus ID: 11650647
Secure electronic mail (e-mail), such as PGP and S/MIME, uses digital signature to provide message authentication, which also…
Expand
2007
2007
Predictive value of multidrug resistance proteins and cellular drug resistance in childhood relapsed acute lymphoblastic leukemia
J. Styczyński
,
M. Wysocki
,
+23 authors
E. Stańczak
Journal of Cancer Research and Clinical Oncology
2007
Corpus ID: 25499104
PurposeCellular resistance in childhood acute leukemias might be related to profile and function of multidrug resistance proteins…
Expand
Highly Cited
2006
Highly Cited
2006
Why does it pay to be selfish in a MANET?
Younghwan Yoo
,
D. Agrawal
IEEE wireless communications
2006
Corpus ID: 2832040
Routing protocols for a mobile ad hoc network have assumed that all mobile nodes voluntarily participate in forwarding others…
Expand
2005
2005
Pretty Good Privacy (PGP)
Clemens Heinrich
Encyclopedia of Cryptography and Security
2005
Corpus ID: 267872556
A calibration method is disclosed for a device in which an offset printing plate is optically scanned to measure the picture…
Expand
2005
2005
Preemptive goal programming using simulated annealing
A. Baykasoğlu
2005
Corpus ID: 60529802
Goal programming is a commonly used technique for modelling and solving multiple objective optimization problems. It has been…
Expand
Highly Cited
2004
Highly Cited
2004
Composite key management for ad hoc networks
Seung Yi
,
R. Kravets
The First Annual International Conference on…
2004
Corpus ID: 2640951
We present composite key management, a novel paradigm for key management in ad hoc networks. While most existing approaches try…
Expand
2001
2001
A security analysis of Pretty Good Privacy
S. Otterloo
2001
Corpus ID: 167670296
Preface Congratulations on your acquisition of A security analysis of PGP. I hope you enjoy reading this text, and that it will…
Expand
Highly Cited
1996
Highly Cited
1996
Personal Mobility for Multimedia Services in the Internet
H. Schulzrinne
International Workshop on Interactive Distributed…
1996
Corpus ID: 4522660
Personal mobility is one of the goals of Universal Personal Telecommunications (UPT) being specified for future deployment. Most…
Expand
1969
1969
Simultaneous approximation of a set of bounded real functions
J. B. Díaz
,
H. McLaughlin
1969
Corpus ID: 6088590
The problem of simultaneous Chebyshev approximation of a set F of uniformly bounded, real-valued functions on a compact interval…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE