Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Secure messaging

Known as: SM 
Secure messaging is a server-based approach to protect sensitive data when sent beyond the corporate borders and provides compliance with industry… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
In the era of mass surveillance and information breaches, privacy of Internet communication, and messaging in particular, is a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2018
2018
Abstract A deniable authenticated key exchange (DAKE) protocol establishes a secure channel without producing cryptographic… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2017
Highly Cited
2017
Many popular web applications incorporate end-to-end secure messaging protocols, which seek to ensure that messages sent between… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2017
2017
We aim to understand, formalize and provably achieve the goals underlying the core key-ratcheting technique of Borisov, Goldberg… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
In this paper we analyze the security and usability of the state-of-the-art secure mobile messenger SIGNAL. In the first part of… Expand
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Motivated by recent revelations of widespread state surveillance of personal communication, many solutions now claim to offer… Expand
  • table I
  • table II
  • table III
Is this relevant?
Highly Cited
2015
Highly Cited
2015
In this paper we investigate new mechanisms for achieving forward secure encryption in store and forward messaging systems such… Expand
  • figure 2
  • table I
  • figure 4
  • table II
  • table III
Is this relevant?
2007
2007
Summary Computer networks have influenced the software industry by providing enormous resources distributed around the globe and… Expand
  • figure 1
  • table 3
Is this relevant?
2003
2003
This paper presents an authentication protocol for high-assurance smart card operating systems that support download of mutually… Expand
  • figure 12
Is this relevant?
Highly Cited
1993
Highly Cited
1993
Privacy Enhanced Mail (PEM) consists of extensions to existing message processing software plus a key management infrastructure… Expand
Is this relevant?