Secure messaging

Known as: SM 
Secure messaging is a server-based approach to protect sensitive data when sent beyond the corporate borders and provides compliance with industry… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A deniable authenticated key exchange (DAKE) protocol establishes a secure channel without producing cryptographic evidence of… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
2017
2017
In recent years, it has come to attention that governments have been doing mass surveillance of personal communications without… (More)
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 2.4
  • figure 2.5
Is this relevant?
2017
2017
Many popular web applications incorporate end-to-end secure messaging protocols, which seek to ensure that messages sent between… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
Today data communication is a modern technology that contains a powerful computer processor to exchange information. But brute… (More)
  • figure 1
  • table 1
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Motivated by recent revelations of widespread state surveillance of personal communication, many solutions now claim to offer… (More)
  • table I
  • table II
  • table III
Is this relevant?
2015
2015
In this paper we investigate new mechanisms for achieving forward secure encryption in store and forward messaging systems such… (More)
  • figure 3
  • table I
  • figure 4
  • table II
  • table III
Is this relevant?
2015
2015
In the wake of recent revelations of mass government surveillance, secure messaging protocols have come under renewed scrutiny. A… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 6
  • figure 4
Is this relevant?
2012
2012
Smartcards are used for a rapidly increasing number of applications including electronic identity, driving licenses, physical… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2005
2005
We present a scenario for user testing secure messaging tools and anti-phishing technology. The scenario, Johnny 2, is loosely… (More)
  • table 1
  • figure 2
  • figure 3
  • figure 4
  • table 2
Is this relevant?
2004
2004
The lack of evidence for message receipt is a missing piece of the infrastructure required for the more professional use of email… (More)
Is this relevant?