Secure channel

In cryptography, a secure channel is a way of transferring data that is resistant to overhearing and tampering. A confidential channel is a way of… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
ARM TrustZone, which provides a Trusted Execution Environment (TEE), normally plays a role in keeping security-sensitive… (More)
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Much research has been conducted to securely outsource multiple parties' data aggregation to an untrusted aggregator without… (More)
  • table I
  • figure 1
  • figure 2
  • figure 3
  • table II
Is this relevant?
Highly Cited
2009
Highly Cited
2009
“Secure Device Pairing” is the process of bootstrapping a secure channel between two previously unassociated devices over a… (More)
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
In recent years, a number of works have appeared that provide formal definitions of the notion of channel and how different kinds… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Network coding provides the possibility to maximize network throughput and receives various applications in traditional computer… (More)
  • figure 1
  • table I
  • figure 2
  • table II
Is this relevant?
2007
2007
On the Use of Channel Bindings to Secure Channels draft-williams-on-channel-binding-03.txt Status of this Memo By submitting this… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
ID-based cryptosystems have many advantages over PKI based cryptosystems in key distribution, but they also have an inherent… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We study the question of how to generically compose symmetric encryption and authentication when building “secure channels” for… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the wellknown… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1976
Highly Cited
1976
Two kinds of contemporary developments in crypcommunications over an insecure channel order to use cryptogtography are examined… (More)
Is this relevant?