Secure communication

Known as: Securely communicate 
Secure communication is when two entities are communicating and do not want a third party to listen in. For that they need to communicate in a way… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1976-2018
020040019762018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
The role of multiple antennas for secure communication is investigated within the framework of Wyner's wiretap channel. We… (More)
  • figure 1
  • figure 2
Is this relevant?
2009
2009
We investigate the effect of certain active attacks on the secrecy capacity of wiretap channels by considering arbitrarily… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Combining data and code from third-party sources has enabled a new wave of <i>web mashups</i> that add creativity and… (More)
  • figure 2
  • figure 3
  • table 1
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
This paper deals with the problem of synchronization of a class of continuous-time chaotic systems using the driveresponse… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
In this brief, a simple and useful technique for both synchronization and secure communication of chaotic systems is developed… (More)
  • figure 3
  • figure 2
  • figure 7
  • figure 8
Is this relevant?
Highly Cited
2001
Highly Cited
2001
<i>The growth of the Internet as a vehicle for secure communication and electronic commerce has brought cryptographic processing… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Problems of secure communication and computation have been studied extensively in network models. In this work we ask what is… (More)
  • table 1
  • table 2
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Impulsive control of a chaotic system is ideal for designing digital control schemes where the control laws are generated by… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 3
  • figure 4
Is this relevant?