Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,366,228 papers from all fields of science
Search
Sign In
Create Free Account
Secure channel
In cryptography, a secure channel is a way of transferring data that is resistant to overhearing and tampering. A confidential channel is a way of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Cryptographic protocol
Cryptography
Diffie–Hellman key exchange
Diffie–Hellman problem
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Towards trusted software-defined networks using a hardware-based Integrity Measurement Architecture
Ludovic Jacquin
,
A. Shaw
,
Chris I. Dalton
IEEE Conference on Network Softwarization
2015
Corpus ID: 14103073
The rise of software-defined networks in recent years has allowed unprecedented agility in network configuration and…
Expand
2013
2013
An Efficient Proxy Signature Scheme Based On RSA Cryptosystem
Swati Verma
,
B. K. Sharma
2013
Corpus ID: 1539971
A proxy signature allows a designated person, called a proxy signer, to sign the message on behalf of the original signer. Proxy…
Expand
2013
2013
Phase mask generation for DRPE method using chaos theory and hash function
M. Taheri
,
S. Mozaffari
2013
Corpus ID: 18867369
2009
2009
Security solutions for cyber-physical systems
K. Venkatasubramanian
2009
Corpus ID: 59905998
Cyber-Physical Systems (CPS) are sensing, communication and processing platforms, deeply embedded in physical processes and…
Expand
2009
2009
Zero-Collision RFID Tags Identification Based on CDMA
Lih-Chyau Wuu
,
Yen-Ju Chen
,
Chi-Hsiang Hung
,
W. Kuo
Fifth International Conference on Information…
2009
Corpus ID: 2747623
One of the killer applications for Radio frequency identification (RFID) system is the automatic identification of physical…
Expand
2007
2007
Improvement of Yang et al.'s threshold proxy signature scheme
Jun Shao
,
Z. Cao
,
Rongxing Lu
Journal of Systems and Software
2007
Corpus ID: 34750412
2006
2006
C4W: An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks
Qi Jing
,
Jian-bin Hu
,
Zhong Chen
IEEE International Conference on Mobile Ad Hoc…
2006
Corpus ID: 3434912
With hardware support and software optimization, public key cryptography (PKC) has been announced feasible on micro sensors…
Expand
1996
1996
A Security Framework Supporting Domain Based Access Control in Distributed Systems
Nicholas Yialelis
,
M. Sloman
Network and Distributed System Security Symposium
1996
Corpus ID: 10619533
This paper describes a security framework for object-based distributed systems which is being developed in the CORBA-compliant…
Expand
1994
1994
Quantum Cryptography with Interferometric Quantum Entanglement
A. Ekert
,
G. Palma
1994
Corpus ID: 14706324
Abstract We provide a theoretical analysis of a quantum interferometric method in quantum cryptography based on the non-local…
Expand
1993
1993
Using smart cards to authenticate passwords
C. Chang
,
Ren-Junn Hwang
,
D. Buehrer
Proceedings of IEEE International Carnahan…
1993
Corpus ID: 62725120
A password authentication scheme which can verify remote passwords without the use of a verification table is presented. Each…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE