Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Secure messaging

Known as: SM 
Secure messaging is a server-based approach to protect sensitive data when sent beyond the corporate borders and provides compliance with industry… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
In the era of mass surveillance and information breaches, privacy of Internet communication, and messaging in particular, is a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2018
2018
Abstract A deniable authenticated key exchange (DAKE) protocol establishes a secure channel without producing cryptographic… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
2017
2017
The effective security provided by secure messaging applications depends heavily on users completing an authentication ceremony—a… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Highly Cited
2017
Highly Cited
2017
Many popular web applications incorporate end-to-end secure messaging protocols, which seek to ensure that messages sent between… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2017
Highly Cited
2017
We aim to understand, formalize and provably achieve the goals underlying the core key-ratcheting technique of Borisov, Goldberg… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2016
2016
In this paper we analyze the security and usability of the state-of-the-art secure mobile messenger SIGNAL. In the first part of… Expand
Highly Cited
2015
Highly Cited
2015
Motivated by recent revelations of widespread state surveillance of personal communication, many solutions now claim to offer… Expand
  • table I
  • table II
  • table III
Highly Cited
2015
Highly Cited
2015
In this paper we investigate new mechanisms for achieving forward secure encryption in store and forward messaging systems such… Expand
  • figure 2
  • table I
  • figure 4
  • table II
  • table III
2004
2004
The lack of evidence for message receipt is a missing piece of the infrastructure required for the more professional use of email… Expand
Highly Cited
1993
Highly Cited
1993
Privacy Enhanced Mail (PEM) consists of extensions to existing message processing software plus a key management infrastructure… Expand