Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,262,004 papers from all fields of science
Search
Sign In
Create Free Account
Secure messaging
Known as:
SM
Secure messaging is a server-based approach to protect sensitive data when sent beyond the corporate borders and provides compliance with industry…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Authentication
Cryptography
Electronic signature
Email authentication
Expand
Broader (2)
Email
Internet privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Practical Traffic Analysis Attacks on Secure Messaging Applications
Alireza Bahramali
,
Ramin Soltani
,
Amir Houmansadr
,
D. Goeckel
,
D. Towsley
Network and Distributed System Security Symposium
2020
Corpus ID: 211266844
Instant Messaging (IM) applications like Telegram, Signal, and WhatsApp have become extremely popular in recent years…
Expand
Highly Cited
2019
Highly Cited
2019
Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging
D. Jost
,
U. Maurer
,
M. Mularczyk
IACR Cryptology ePrint Archive
2019
Corpus ID: 53239920
In the era of mass surveillance and information breaches, privacy of Internet communication, and messaging in particular, is a…
Expand
2017
2017
Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications
E. Vaziripour
,
Justin Wu
,
+4 authors
D. Zappala
Symposium On Usable Privacy and Security
2017
Corpus ID: 30928642
The effective security provided by secure messaging applications depends heavily on users completing an authentication ceremony—a…
Expand
2015
2015
Deniable Key Exchanges for Secure Messaging
Nik Unger
,
I. Goldberg
Conference on Computer and Communications…
2015
Corpus ID: 15731698
In the wake of recent revelations of mass government surveillance, secure messaging protocols have come under renewed scrutiny. A…
Expand
2013
2013
Cross-platform, secure message delivery for mobile devices
David Jaramillo
,
Richard Newhook
,
Robert Smart
Proceedings of IEEE Southeastcon
2013
Corpus ID: 6327756
With the rise of mobile technology, modern organizations are encountering rapidly evolving demands to their communications and…
Expand
2010
2010
Distributed IP Watchlist Generation for Intrusion Detection in the Electrical Smart Grid
R. Klump
,
M. Kwiatkowski
Critical Infrastructure Protection
2010
Corpus ID: 2939787
The electric power infrastructure in the United States is undergoing a significant transformation. To enhance the ability of the…
Expand
2007
2007
Study of Network Performance Monitoring Tools-SNMP
K. Kumar
2007
Corpus ID: 111343515
Summary Computer networks have influenced the software industry by providing enormous resources distributed around the globe and…
Expand
2003
2003
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card
H. Scherzer
,
R. Canetti
,
P. Karger
,
H. Krawczyk
,
T. Rabin
,
David C. Toll
European Symposium on Research in Computer…
2003
Corpus ID: 398156
This paper presents an authentication protocol for high-assurance smart card operating systems that support download of mutually…
Expand
1998
1998
An implementation of a graph-based modeling system for structured modeling (GBMS/SM)
K. Chari
,
Tarun K. Sen
Decision Support Systems
1998
Corpus ID: 44870408
Highly Cited
1993
Highly Cited
1993
Internet Privacy Enhanced Mail
S. Kent
CACM
1993
Corpus ID: 15759913
Privacy Enhanced Mail (PEM) consists of extensions to existing message processing software plus a key management infrastructure…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE