Skip to search formSkip to main contentSkip to account menu

Secure communication

Known as: Secure, Securely communicate 
Secure communication is when two entities are communicating and do not want a third party to listen in. For that they need to communicate in a way… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Chaos modelling, chaos control and chaos synchronisation are active areas in chaos theory, while research in these areas has… 
Highly Cited
2013
Highly Cited
2013
Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless… 
Highly Cited
2010
Highly Cited
2010
We propose an application-aware approach to setting up secure multicast groups for power grid communications that automatically… 
Highly Cited
2007
Highly Cited
2007
We propose an architecture that allows code to execute in complete isolation from other software while trusting only a tiny… 
Highly Cited
2004
Highly Cited
2004
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence… 
Highly Cited
2003
Highly Cited
2003
In this brief, we present a new sufficient condition for the stabilization and the synchronization of Chua's circuit. The Chua's… 
Highly Cited
2003
Highly Cited
2003
Highly Cited
2003
We propose a public-key-based optical image cryptosystem for practical secure communications since conventional optical crypto… 
Highly Cited
2002
Highly Cited
2002
Ubiquitous computing is poised to revolutionize the way we compute and interact with each other. However, unless privacy concerns… 
Highly Cited
1995
Highly Cited
1995
The capacity of local area networks (LAN) can be substantially increased by amalgamating different access techniques. Wavelength…