Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,053,017 papers from all fields of science
Search
Sign In
Create Free Account
Secure channel
In cryptography, a secure channel is a way of transferring data that is resistant to overhearing and tampering. A confidential channel is a way of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Cryptographic protocol
Cryptography
Diffie–Hellman key exchange
Diffie–Hellman problem
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Towards trusted software-defined networks using a hardware-based Integrity Measurement Architecture
Ludovic Jacquin
,
A. Shaw
,
Chris I. Dalton
IEEE Conference on Network Softwarization
2015
Corpus ID: 14103073
The rise of software-defined networks in recent years has allowed unprecedented agility in network configuration and…
Expand
2014
2014
Lightweight security scheme for IoT applications using CoAP
Arijit Ukil
,
S. Bandyopadhyay
,
Abhijan Bhattacharyya
,
A. Pal
,
Tulika Bose
International Journal of Pervasive Computing and…
2014
Corpus ID: 206397565
Purpose – The purpose of this paper is to study lightweight security scheme for Internet of Things (IoT) applications using…
Expand
2013
2013
An Efficient Proxy Signature Scheme Based On RSA Cryptosystem
Swati Verma
,
B. K. Sharma
2013
Corpus ID: 1539971
A proxy signature allows a designated person, called a proxy signer, to sign the message on behalf of the original signer. Proxy…
Expand
2013
2013
Network-Level Access Control Management for the Cloud
K. Beaty
,
A. Kundu
,
V. Naik
,
A. Acharya
IEEE International Conference on Cloud…
2013
Corpus ID: 16146369
One of the major security threats that public cloud computing platforms face today is that the active cloud virtual machine…
Expand
2009
2009
Security solutions for cyber-physical systems
K. Venkatasubramanian
2009
Corpus ID: 59905998
Cyber-Physical Systems (CPS) are sensing, communication and processing platforms, deeply embedded in physical processes and…
Expand
2009
2009
Zero-Collision RFID Tags Identification Based on CDMA
Lih-Chyau Wuu
,
Yen-Ju Chen
,
Chi-Hsiang Hung
,
W. Kuo
Fifth International Conference on Information…
2009
Corpus ID: 2747623
One of the killer applications for Radio frequency identification (RFID) system is the automatic identification of physical…
Expand
2006
2006
C4W: An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks
Qi Jing
,
Jian-bin Hu
,
Zhong Chen
IEEE International Conference on Mobile Ad Hoc…
2006
Corpus ID: 3434912
With hardware support and software optimization, public key cryptography (PKC) has been announced feasible on micro sensors…
Expand
Review
2003
Review
2003
An overview of the GlobalPlatform smart card specification
K. Markantonakis
,
K. Mayes
Information Security Technical Report
2003
Corpus ID: 29328341
1996
1996
A Security Framework Supporting Domain Based Access Control in Distributed Systems
Nicholas Yialelis
,
M. Sloman
Network and Distributed System Security Symposium
1996
Corpus ID: 10619533
This paper describes a security framework for object-based distributed systems which is being developed in the CORBA-compliant…
Expand
1994
1994
Quantum Cryptography with Interferometric Quantum Entanglement
A. Ekert
,
G. Palma
1994
Corpus ID: 14706324
Abstract We provide a theoretical analysis of a quantum interferometric method in quantum cryptography based on the non-local…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE