Skip to search formSkip to main contentSkip to account menu

Secure channel

In cryptography, a secure channel is a way of transferring data that is resistant to overhearing and tampering. A confidential channel is a way of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
  • 2014
  • Corpus ID: 17137332
Cloud storage is a storage of data online in cloud which is accessible from multiple and connected resources. Cloud storage can… 
2013
2013
A proxy signature allows a designated person, called a proxy signer, to sign the message on behalf of the original signer. Proxy… 
2012
2012
By allowing the mixture of information at the source and intermediate nodes, network coding benefits network protocols with… 
2011
2011
Anonymous communication is usually achieved by using overlay networks and public-key cryptography. Besides well-established… 
2011
2011
The nodes of Wireless Sensor Networks (WSNs) are deployed in hostile environments faces the security problem of eavesdropping and… 
2009
2009
In this paper, we shall propose a multi-proxy multi-signature scheme which allows any u or more proxy signers from a designated… 
Review
2005
Review
2005
The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted… 
2003
2003
Issa Khalil, Saurabh Bagchi Dependable Computing Systems Lab School of Electrical & Computer Engineering, Purdue University 465… 
1998
1998
We consider the problem of finding k disjoint dominating sets with a min imum size of their union, in a given network. We show… 
1994
1994
Abstract We provide a theoretical analysis of a quantum interferometric method in quantum cryptography based on the non-local…