Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,290,750 papers from all fields of science
Search
Sign In
Create Free Account
Secure channel
In cryptography, a secure channel is a way of transferring data that is resistant to overhearing and tampering. A confidential channel is a way of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Cryptographic protocol
Cryptography
Diffie–Hellman key exchange
Diffie–Hellman problem
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Data sharing in cloud storage with key-aggregate cryptosystem.
2014
Corpus ID: 17137332
Cloud storage is a storage of data online in cloud which is accessible from multiple and connected resources. Cloud storage can…
Expand
2013
2013
An Efficient Proxy Signature Scheme Based On RSA Cryptosystem
Swati Verma
,
B. K. Sharma
2013
Corpus ID: 1539971
A proxy signature allows a designated person, called a proxy signer, to sign the message on behalf of the original signer. Proxy…
Expand
2012
2012
Securing network coding against pollution attacks based on space and time properties
Ming He
,
Hong Wang
,
Lin Chen
,
Z. Gong
,
Fan Dai
,
Zhihong Liu
Proceedings of 2nd International Conference on…
2012
Corpus ID: 18187992
By allowing the mixture of information at the source and intermediate nodes, network coding benefits network protocols with…
Expand
2011
2011
Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity
S. Rass
,
R. Wigoutschnigg
,
P. Schartner
J. Wirel. Mob. Networks Ubiquitous Comput…
2011
Corpus ID: 16108626
Anonymous communication is usually achieved by using overlay networks and public-key cryptography. Besides well-established…
Expand
2011
2011
A Key Distribution and Management Scheme for Hierarchical Wireless Sensor Network
M. Abdullah
2011
Corpus ID: 16189335
The nodes of Wireless Sensor Networks (WSNs) are deployed in hostile environments faces the security problem of eavesdropping and…
Expand
2009
2009
A NON-REPUDIABLE MULTI-PROXY MULTI-SIGNATURE SCHEME
M. Hwang
,
Shiang-Feng Tzeng
,
S. Chiou
2009
Corpus ID: 51859464
In this paper, we shall propose a multi-proxy multi-signature scheme which allows any u or more proxy signers from a designated…
Expand
Review
2005
Review
2005
Smart Cards and Mobile Device Authentication: an Overview and Implementation
W. Jansen
,
S. Gavrila
,
Clément Séveillac
,
Vlad Korolev
2005
Corpus ID: 114566947
The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted…
Expand
2003
2003
SECOS : Key Management for Scalable and Energy Efficient Crypto On Sensors
Issa M. Khalil
,
S. Bagchi
2003
Corpus ID: 7329089
Issa Khalil, Saurabh Bagchi Dependable Computing Systems Lab School of Electrical & Computer Engineering, Purdue University 465…
Expand
1998
1998
Disjoint and unfolding domination in graphs
Jan Kratochvíl
,
P. Manuel
,
Mirka Miller
,
A. Proskurowski
The Australasian Journal of Combinatorics
1998
Corpus ID: 978293
We consider the problem of finding k disjoint dominating sets with a min imum size of their union, in a given network. We show…
Expand
1994
1994
Quantum Cryptography with Interferometric Quantum Entanglement
A. Ekert
,
G. Palma
1994
Corpus ID: 14706324
Abstract We provide a theoretical analysis of a quantum interferometric method in quantum cryptography based on the non-local…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE