Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,053 papers from all fields of science
Search
Sign In
Create Free Account
Secure communication
Known as:
Secure
, Securely communicate
Secure communication is when two entities are communicating and do not want a third party to listen in. For that they need to communicate in a way…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Android
Authentication
Code
Code talker
Expand
Broader (1)
Internet privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Takagi-Sugeno fuzzy logic controller for Liu-Chen four-scroll chaotic system
S. Vaidyanathan
,
A. Azar
International Journal of Intelligent Engineering…
2016
Corpus ID: 33053639
Chaos modelling, chaos control and chaos synchronisation are active areas in chaos theory, while research in these areas has…
Expand
Highly Cited
2013
Highly Cited
2013
Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks
Wei Liu
,
Hiroki Nishiyama
,
N. Ansari
,
Jie Yang
,
N. Kato
IEEE Transactions on Parallel and Distributed…
2013
Corpus ID: 17257610
Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless…
Expand
Highly Cited
2010
Highly Cited
2010
Application-Aware Secure Multicast for Power Grid Communications
Jianqing Zhang
,
Carl A. Gunter
First IEEE International Conference on Smart Grid…
2010
Corpus ID: 2637788
We propose an application-aware approach to setting up secure multicast groups for power grid communications that automatically…
Expand
Highly Cited
2007
Highly Cited
2007
Minimal TCB Code Execution
Jonathan M. McCune
,
Bryan Parno
,
A. Perrig
,
M. Reiter
,
Arvind Seshadri
IEEE Symposium on Security and Privacy
2007
Corpus ID: 5638506
We propose an architecture that allows code to execute in complete isolation from other software while trusting only a tiny…
Expand
Highly Cited
2004
Highly Cited
2004
A steganographic scheme for secure communications based on the chaos and euler Theorem
D. Lou
,
Chia-Hung Sung
IEEE transactions on multimedia
2004
Corpus ID: 12770859
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence…
Expand
Highly Cited
2003
Highly Cited
2003
Chaotic cryptosystem with high sensitivity to parameter mismatch
Kun Li
,
Y. Soh
,
Zhengguo Li
2003
Corpus ID: 13029387
In this brief, we present a new sufficient condition for the stabilization and the synchronization of Chua's circuit. The Chua's…
Expand
Highly Cited
2003
Highly Cited
2003
Chaos synchronization of a horizontal platform system
Z. Ge
,
Tsung-Chih Yu
,
Yen-Sheng Chen
2003
Corpus ID: 58903561
Highly Cited
2003
Highly Cited
2003
Public-key-based optical image cryptosystem based on data embedding techniques
Guo-Shiang Lin
,
Hsuan T. Chang
,
W. Lie
,
Cheng-Hung Chuang
2003
Corpus ID: 61115729
We propose a public-key-based optical image cryptosystem for practical secure communications since conventional optical crypto…
Expand
Highly Cited
2002
Highly Cited
2002
Routing through the mist: privacy preserving communication in ubiquitous computing environments
J. Al-Muhtadi
,
R. Campbell
,
Apu Kapadia
,
M. D. Mickunas
,
Seung Yi
Proceedings 22nd International Conference on…
2002
Corpus ID: 2648878
Ubiquitous computing is poised to revolutionize the way we compute and interact with each other. However, unless privacy concerns…
Expand
Highly Cited
1995
Highly Cited
1995
Hybrid wavelength hopping/time spreading code division multiple access systems
L. Tancevski
,
Ivan Andonovic
Other Conferences
1995
Corpus ID: 110089137
The capacity of local area networks (LAN) can be substantially increased by amalgamating different access techniques. Wavelength…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE