This article is written like a personal reflection, personal essay, or argumentative essay that states a Wikipedia editor's personal feelings or presents an original argument about a topic. Please help improve it by rewriting it in an encyclopedic style.(January 2015) (Learn how and when to remove this message)
Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception.[1][2] Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot intercept what is said. Other than spoken face-to-face communication with no possible eavesdropper, it is probable that no communication is guaranteed to be secure in this sense, although practical obstacles such as legislation, resources, technical issues (interception and encryption), and the sheer volume of communication serve to limit surveillance.
With many communications taking place over long distance and mediated by technology, and increasing awareness of the importance of interception issues, technology and its compromise are at the heart of this debate. For this reason, this article focuses on communications mediated or intercepted by technology.
Also see Trusted Computing, an approach under present development that achieves security in general at the potential cost of compelling obligatory trust in corporate and government bodies.
^D. P. Agrawal and Q-A. Zeng, Introduction to Wireless and Mobile Systems (2nd Edition, published by Thomson, April 2005) ISBN 978-0-534-49303-5
^J.K. and K. Ross, Computer Networking (2nd Ed, Addison Wesley, 2003) ISBN 978-0-321-17644-8
and 24 Related for: Secure communication information
Securecommunication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate...
Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for securecommunication over a computer...
method for securecommunication, which is now called BB84. Independently, in 1991 Artur Ekert proposed to use Bell's inequalities to achieve secure key distribution...
disruption, modification, perusal, inspection, recording or destruction Securecommunication, when two entities are communicating and do not want a third party...
Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication...
"eschew surplusage". Obfuscation of oral or written communication achieves a degree of securecommunication without a need to rely upon technology. This technique...
and a public key infrastructure. Cryptochannel Hybrid encryption Securecommunication Ran Canetti: Universally Composable Signatures, Certification, and...
legitimacy of both parties before allowing any communication to proceed. Secure Messaging: Enabling securecommunication between the SAM and the host system by...
SecureDrop is a free software platform for securecommunication between journalists and sources (whistleblowers). It was originally designed and developed...
"study", respectively), is the practice and study of techniques for securecommunication in the presence of adversarial behavior. More generally, cryptography...
and is only achievable for very large background noise. In 2009, a securecommunication scheme based on quantum illumination was proposed. This scheme is...
electric vehicles. The standard provides multiple use cases like securecommunication, smart charging and the Plug & Charge feature used by some electric...
Quantum key distribution (QKD) is a securecommunication method that implements a cryptographic protocol involving components of quantum mechanics. It...
Voice over secure internet protocol VOSIP has become the de facto standard for securing voice communication, replacing the need for Secure Terminal Equipment...
Secure Scuttlebutt (SSB) is a peer-to peer communication protocol, mesh network, and self-hosted social media ecosystem. Each user hosts their own content...
SecureCommunication based on Quantum Cryptography (SECOQC) is a project that aims to develop quantum cryptography (see there for further details). The...
The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable...
cybersecurity features like secure boot, certificate management, data integrity, forward error correction (FEC), securecommunication via TLS, among others...
Mobile secure gateway (MSG) is an industry term for the software or hardware appliance that provides securecommunication between a mobile application...
In either case, it is often important for successful communication that the connection is secure to ensure that the transmitted data reaches only the...
creating a secure connection between a computing device and a computer network, or between two networks, using an insecure communication medium such...
Internet censorship circumvention tool that uses a combination of securecommunication and obfuscation technologies, such as a VPN, SSH, and a Web proxy...
Bootstrapping securecommunication protocols, such as Internet key exchange (IKE) and SSL/TLS. In both of these, initial set-up of a secure channel (a "security...
The Secure Communications Interoperability Protocol (SCIP) is a US standard for secure voice and data communication, for circuit-switched one-to-one connections...