Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Security service (telecommunication)

Known as: Security Service, X.800 
Security service is a service, provided by a layer of communicating open systems, which ensures adequate security of the systems or of data transfers… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Today’s smartphone operating systems frequently fail to provide users with visibility into how third-party applications collect… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Broadcast authentication is a critical security service in wireless sensor networks. There are two general approaches for… Expand
  • figure 1
  • figure 4
  • figure 5
  • figure 6
  • table I
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Broadcast authentication is a fundamental security service in distributed sensor networks. This paper presents the development of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We envision a future where people’s living spaces are interactive and programmable. Users interact with their offices, homes… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
1998
Highly Cited
1998
This memo describes a protocol utilizing security concepts necessary for establishing Security Associations (SA) and… Expand
  • figure 1
Is this relevant?
Highly Cited
1993
Highly Cited
1993
This Generic Security Service Application Program Interface (GSS-API) definition provides security services to callers in a… Expand
Is this relevant?