Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,015,103 papers from all fields of science
Search
Sign In
Create Free Account
Security association
Known as:
Association
, SA
A Security Association (SA) is the establishment of shared security attributes between two network entities to support secure communication. An SA…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Broader (2)
Cryptography
IPsec
Internet Key Exchange
Internet Security Association and Key Management Protocol
Kerberized Internet Negotiation of Keys
Layer 2 Tunneling Protocol
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
International Guarantee for Social Security Rights
S. G. Zamani
,
A. A. Evin
2016
Corpus ID: 168476607
During their turbulent life, humans are always at risk of an unintended and unavoidable events and thus seek to gain pain relief…
Expand
2014
2014
An access authentication protocol for trusted handoff in wireless mesh networks
Peng Xiao
,
Jingsha He
,
Yingfang Fu
Comput. Stand. Interfaces
2014
Corpus ID: 519869
Review
2014
Review
2014
Security Analysis of DTLS Structure and Its Application to Secure Multicast Communication
S. Shaheen
,
M. Yousaf
International Conference on Frontiers of…
2014
Corpus ID: 14217858
Transport Layer Security (TLS) provides reliable and in-order communication. However due to its retransmission behavior it causes…
Expand
2013
2013
The Role of National Social Protection Floors in Extending Social Security to All
Krzysztof Hagemejer
,
Roddy Mckinnon
2013
Corpus ID: 153686363
In June 2011 the International Labour Conference (ILC) adopted a Resolution and Conclusions setting out the Organization's new…
Expand
2011
2011
Mobile MPLS with route optimization: The proposed protocol and simulation study
Savinya Polvichai
,
Prawit Chumchu
International Joint Conference on Computer…
2011
Corpus ID: 15045135
Mobile MPLS, as the integration of Mobile IP and MPLS (Multiprotocol Label Switching), has the benefits of having mobility…
Expand
2010
2010
Sender access and data distribution control for inter-domain multicast groups
S. Islam
,
J. William Atwood
Comput. Networks
2010
Corpus ID: 44270539
2009
2009
Security enhanced multi-hop over the air reprogramming with Fountain Codes
J. Bohli
,
A. Hessler
,
Osman Ugus
,
D. Westhoff
IEEE Conference on Local Computer Networks
2009
Corpus ID: 14630605
Recently, several code update approaches for multi-hop sensor networks have been proposed basically addressing two orthogonal…
Expand
2008
2008
CLL: A Cryptographic Link Layer for Local Area Networks
Yves Igor Jerschow
,
Christian Lochert
,
Björn Scheuermann
,
M. Mauve
International Conference on Security and…
2008
Corpus ID: 6714112
Ethernet and IP form the basis of the vast majority of LAN installations. But these protocols do not provide comprehensive…
Expand
2005
2005
Using Secure Coprocessors to Protect Access to Enterprise Networks
Haidong Xia
,
J. Kanchana
,
J. Brustoloni
NETWORKING
2005
Corpus ID: 393928
Enterprise firewalls can be easily circumvented, e.g. by attack agents aboard infected mobile computers or telecommuters…
Expand
2000
2000
Railroad Retirement System : Ninth Actuarial Valuation by
A. M. Nlessen
2000
Corpus ID: 18209902
THE RAILROAD RETIREMENT BOARD is required by law to make actuarial valuations for the retirement program under its jurisdiction…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE