The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for SSL with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1997 (17) 1998-2000 (22) 2001 (16) 2002 (23) 2003 (24) 2004 (33) 2005 (50) 2006 (51) 2007 (44) 2008 (45) 2009 (30) 2010 (18) 2011 (27) 2012 (17) 2013 (17) 2014 (22) 2015 (23) 2016 (21) 2017 (17) 2018 (30) 2019 (29) 2020-2021 (39) 2022 (30) 2023 (46) 2024 (15)
Publication types (Num. hits)
article(198) incollection(5) inproceedings(500) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 510 occurrences of 301 keywords

Results
Found 706 publication records. Showing 706 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
117Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwon Baik Design and Implementation of an SSL Component Based on CBD. Search on Bibsonomy AsiaSim The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
115Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon, KyoungSoo Park Accelerating SSL with GPUs. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF GPU, CUDA, SSL
100Jordi Guitart, David Carrera 0001, Vicenç Beltran 0001, Jordi Torres, Eduard Ayguadé Session-Based Adaptive Overload Control for Secure Dynamic Web Applications. Search on Bibsonomy ICPP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
95Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrère, Abdelmalek Benzekri Which Web Browsers Process SSL Certificates in a Standardized Way? Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
95Ryosuke Hatsugai, Takamichi Saito Load-Balancing SSL Cluster Using Session Migration. Search on Bibsonomy AINA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
95Ronald Mraz Secure Blue: An Architecture for a Scalable, Reliable, High Volume SSL Internet Server. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
91Diana Berbecaru, Antonio Lioy On the Robustness of Applications Based on the SSL and TLS Security Protocols. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MITM attack, security, SSL/TLS, truncation attack
84Jingli Zhou, Hongtao Xia, Jifeng Yu, Xiaofeng Wang Asymmetrical SSL Tunnel Based VPN. Search on Bibsonomy ISPA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
84André Adelsbach, Sebastian Gajek, Jörg Schwenk Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
84Hovav Shacham, Dan Boneh Improving SSL Handshake Performance via Batching. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
81Homin K. Lee, Tal Malkin, Erich M. Nahum Cryptographic strength of ssl/tls servers: current and recent practices. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF network security, servers, ssl
77Yasunori Nagasaka, Tatsumasa Kitahara, Tomoichi Takahashi A Proposal of Bridging Activities between RoboCupJunior and Senior Leagues. Search on Bibsonomy RoboCup The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
77Krishna Kant 0001, Ravishankar K. Iyer, Prasant Mohapatra Architectural Impact of Secure Socket Layer on Internet Servers. Search on Bibsonomy ICCD The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
73Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Performance Evaluation, Network Security, Elliptic Curve Cryptography, Side-Channel Analysis, Efficient Implementation
73Larry D. Bisel The Role of SSL in Cybersecutiry. Search on Bibsonomy IT Prof. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
73Xiaodong Lin 0001, Johnny W. Wong, Weidong Kou Performance Analysis of Secure Web Server Based on SSL. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
69Adonis P. H. Fung, K. W. Cheung 0003 SSLock: sustaining the trust on entities brought by SSL. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF SSL trust management, domain naming convention, man-in-the-middle attacks
66Kazimierz Subieta Semantics of Query Languages for Network Databases. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
64Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES
64Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha Analyzing the energy consumption of security protocols. Search on Bibsonomy ISLPED The full citation details ... 2003 DBLP  DOI  BibTeX  RDF energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES
62Fang Qi, Zhe Tang, Guojun Wang 0001 Attacks vs. Countermeasures of SSL Protected Trust Model. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Jin-Ha Kim, Gyu Sang Choi, Chita R. Das An SSL Back-End Forwarding Scheme in Cluster-Based Web Servers. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF application server layer, cluster, Web servers, load distribution, user-level communication, Secure Sockets Layer
62Claude Castelluccia, Einar Mykletun, Gene Tsudik Improving secure server performance by re-balancing SSL/TLS handshakes. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF server-aided RSA, server-aided secure computation, load-balancing, denial-of-service, hardware accelerators, client puzzles
62Fang Qi, Weijia Jia 0001, Feng Bao 0001, Yongdong Wu Batching SSL/TLS Handshake Improved. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
62Nau Okamoto, Shigetomo Kimura, Yoshihiko Ebihara An Introduction of Compression Algorithms into SSL/TLS and Proposal of Compression Algorithms Specialized for Application. Search on Bibsonomy AINA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
55Jinhui Tang 0001, Xian-Sheng Hua 0001, Guo-Jun Qi, Tao Mei 0001, Xiuqing Wu Anisotropic Manifold Ranking for Video Annotation. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Kevin J. Ma, Radim Bartos Analysis of Transport Optimization Techniques. Search on Bibsonomy ICWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
55Xuehai Bian, Gregory D. Abowd, James M. Rehg Using Sound Source Localization in a Home Environment. Search on Bibsonomy Pervasive The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55Vorapranee Khu-smith, Chris J. Mitchell Using GSM to enhance e-commerce security. Search on Bibsonomy Workshop Mobile Commerce The full citation details ... 2002 DBLP  DOI  BibTeX  RDF GSM security, mobile or Internet payment protocol, E-commerce security
53Byung kwan Lee, Tai-Chi Lee, Seung Hae Yang HESSL (Highly Enhanced Security Socket Layer) Protocol. Search on Bibsonomy CEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF HESSL, F_{2^m } ECC, F_{2^m } HECC, BSB, SSL
52Xuewang Zhang, Linlin Wang Key Technologies for Security Enhancing of Payment Gateway. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF payment gateway, security enhancing, fusion-based solution for SSL and SET protocols, secure hash algorithm, AES
52Mohammed Assora, James Kadirire, Ayoub Shirvani Using WPKI for Security of Web Transaction. Search on Bibsonomy EC-Web The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web transaction security, wireless security services, digital signature, SSL/TLS
52Mohammed Assora, Ayoub Shirvani Enhancing the Security and Efficiency of 3-D Secure. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 3-D Secure, password based authentication and key exchange, online transaction security, SSL/TLS
50Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo Rodenhaeuser, Bruno Kaiser A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA). Search on Bibsonomy KiVS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50AbdelNasir Alshamsi, Takamichi Saito A Technical Comparison of IPSec and SSL. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
50Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Martin Vuagnoux Password Interception in a SSL/TLS Channel. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
50Vlastimil Klíma, Ondrej Pokorný, Tomás Rosa Attacking RSA-Based Sessions in SSL/TLS. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
50Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis Using SSL/TLS in authentication and key agreement procedures of future mobile networks. Search on Bibsonomy MWCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
47Vipul Gupta, Sumit Gupta, Sheueling Chang Shantz, Douglas Stebila Performance analysis of elliptic curve cryptography for SSL. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secure socket layer (SSL), wireless, elliptic curve cryptography (ECC), internet security
44Philippe Thomas Semi-Supervised Learning by Olivier Chapelle, Bernhard Schölkopf, and Alexander Zien (Review) Search on Bibsonomy IEEE Trans. Neural Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
44Tony Jebara, Jun Wang 0006, Shih-Fu Chang Graph construction and b-matching for semi-supervised learning. Search on Bibsonomy ICML The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
44Kaizhu Huang, Zenglin Xu, Irwin King, Michael R. Lyu Semi-supervised Learning from General Unlabeled Data. Search on Bibsonomy ICDM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Wen Wu, Jie Yang 0001 Semi-supervised learning of object categories from paired local features. Search on Bibsonomy CIVR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF semi-supervised learning, object classification
44Jianguo Zhang, Fenghai Yu, Jianyong Sun, Yuanyuan Yang, Chenwen Liang DICOM Image Secure Communications With Internet Protocols IPv6 and IPv4. Search on Bibsonomy IEEE Trans. Inf. Technol. Biomed. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Laurent Bernaille, Renata Teixeira Early Recognition of Encrypted Applications. Search on Bibsonomy PAM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Chik How Tan, Joseph Chee Ming Teo Protection AgainstWeb-based Password Phishing. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Lars Völker, Marcus Schöller Secure TLS: Preventing DoS Attacks with Lower Layer Authentication. Search on Bibsonomy KiVS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Thawatchai Chomsiri HTTPS Hacking Protection. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Jin-Ha Kim, Gyu Sang Choi, Chita R. Das A Load Balancing Scheme for Cluster-based Secure Network Servers. Search on Bibsonomy CLUSTER The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle The Design and Implementation of Protocol-Based Hidden Key Recovery. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
44Yoshiaki Shiraishi, Youji Fukuta, Masakatu Morii Remote Access VPN with Port Protection Function by Mobile Codes. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
44Qing Wang, Dwight J. Makaroff, H. Keith Edwards, Ryan Thompson Workload characterization for an E-commerce web site. Search on Bibsonomy CASCON The full citation details ... 2003 DBLP  BibTeX  RDF performance evaluation, electronic commerce, workload characterization
44Lawrence C. Paulson Making Sense of Specifications: The Formalization of SET (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
44Robert Eschbach, Uwe Glässer, Reinhard Gotzhein, Andreas Prinz 0001 On the Formal Semantics of SDL-2000: A Compilation Approach Based on an Abstract SDL Machine. Search on Bibsonomy Abstract State Machines The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
42Quratul-ain Mahesar, Asadullah Shah Securing XML Web Services by using a Proxy Web Service Model. Search on Bibsonomy SCSS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Web Services, XML, SSL
42Fang Qi, Feng Bao 0001, Tieyan Li, Weijia Jia 0001, Yongdong Wu Preventing Web-Spoofing with Automatic Detecting Security Indicator. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Automatic Detecting Security Indicator, SSL, Web Spoofing
42Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF degenerate divisor, scalar multiplication, timing attack, SSL, efficient computation, hyperelliptic curve cryptosystem
42Daniel Bleichenbacher Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF PKCS, RSA, SSL, chosen ciphertext attack
41Rolf Oppliger, Sebastian Gajek Effective Protection Against Phishing and Web Spoofing. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF visual spoofing, phishing, SSL/TLS, Web spoofing
41Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Network Domain Security, Mobile Networks, UMTS, PKI, IPsec, SSL/TLS
39Yongdong Wu, Haixia Yao, Feng Bao 0001 Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Christiaan J. Lamprecht, Aad P. A. van Moorsel Runtime Security Adaptation Using Adaptive SSL. Search on Bibsonomy PRDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Christiaan J. Lamprecht, Aad P. A. van Moorsel Adaptive SSL: Design, Implementation and Overhead Analysis. Search on Bibsonomy SASO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Yongdong Wu, Feng Bao 0001 Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Hugo Krawczyk The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
39Zhimin Song, Sihan Qing Applying NCP Logic to the Analysis of SSL 3.0. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
37Yoonyoung Lee, Soonhaeng Hur, Dongho Won, Seungjoo Kim Cipher Suite Setting Problem of SSL Protocol and it's Solutions. Search on Bibsonomy AINA Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cipher Suite, Security, SSL, Secure Socket Layer
36Rolf Oppliger, Ralf Hauser, David A. Basin SSL/TLS Session-Aware User Authentication. Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF man-in-the-middle (MITM) attacks, SSL/TLS protocols, security, user authentication
35Merve Melis Simsek, Tamer Ergun, Hüseyin Temuçin SSL Test Suite: SSL Certificate Test Public Key Infrastructure. Search on Bibsonomy SIU The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
35Wai-Kong Lee, Xian-Fu Wong, Bok-Min Goi, Raphael C.-W. Phan CUDA-SSL: SSL/TLS accelerated by GPU. Search on Bibsonomy ICCST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Ren Zhao, Xiaohong Li 0001, Guangquan Xu, Zhiyong Feng 0002, Jianye Hao E-SSL: An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet. Search on Bibsonomy SOFL+MSVL The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
35Sirikarn Pukkawanna, Gregory Blanc, Joaquín García-Alfaro, Youki Kadobayashi, Hervé Debar Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment. Search on Bibsonomy BADGERS@ESORICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
33Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy TruWallet: trustworthy and migratable wallet-based web authentication. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF password wallet, secure migration, trusted computing, phishing, identity theft
33Kai Zhang 0001, James T. Kwok, Bahram Parvin Prototype vector machine for large scale semi-supervised learning. Search on Bibsonomy ICML The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Takamichi Saito, Kiyomi Sekiguchi, Ryosuke Hatsugai Authentication Binding between TLS and HTTP. Search on Bibsonomy NBiS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Ben Adida Sessionlock: securing web sessions against eavesdropping. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF web security
33Haixin Wang, Guoqiang Bai 0001, Hongyi Chen Zodiac: System architecture implementation for a high-performance Network Security Processor. Search on Bibsonomy ASAP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner 0001 Dynamic pharming attacks and locked same-origin policies for web browsers. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF same-origin policy, pharming, web authentication
33Meng Wang 0001, Xian-Sheng Hua 0001, Xun Yuan 0001, Yan Song 0001, Li-Rong Dai 0001 Optimizing multi-graph learning: towards a unified video annotation scheme. Search on Bibsonomy ACM Multimedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF semi-supervised learning, video annotation, multimodal fusion
33Camille Gaspard, Batoul Haidar, Ayman I. Kayssi, Ali Chehab SmartSSL: Efficient Policy-Based Web Security. Search on Bibsonomy AICCSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Takamichi Saito, Ryosuke Hatsugai, Toshiyuki Kito On Compromising Password-Based Authentication over HTTPS. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Vipul Gupta, Matthew Millard, Stephen Fung, Yu Zhu, Nils Gura, Hans Eberle, Sheueling Chang Shantz Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper). Search on Bibsonomy PerCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Ronald D. Blanton, John P. Hayes On the properties of the input pattern fault model. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF fault testing, testing digital circuits, ATPG, fault models, faults, defects
33Vorapranee Khu-smith, Chris J. Mitchell Enhancing E-commerce Security Using GSM Authentication. Search on Bibsonomy EC-Web The full citation details ... 2003 DBLP  DOI  BibTeX  RDF E-commerce transactions security, GSM security, payment protocol
33Takamichi Saito, Kentaro Umesawa, Toshiyuki Kito, Hiroshi G. Okuno Privacy-Enhanced SPKI Access Control on PKIX and Its Application to Web Server . Search on Bibsonomy AINA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Lawrence C. Paulson Inductive Analysis of the Internet Protocol TLS (Position Paper). Search on Bibsonomy Security Protocols Workshop The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
33Mark C. Hansen, John P. Hayes High-level test generation using physically-induced faults. Search on Bibsonomy VTS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF high-level test generation, physically-induced faults, industry-standard single stuck-line faults, independent functional faults, near-minimal size, fault diagnosis, logic testing, integrated circuit testing, design for testability, automatic testing, functional tests, failure analysis, benchmark circuits, circuit under test
31Nabil Schear, David M. Nicol Performance Analysis of Real Traffic Carried with Encrypted Cover Flows. Search on Bibsonomy PADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, discrete-event simulation, traffic analysis, network modeling, SSL
30Heesun Park, Stan Redford Client certificate and IP address based multi-factor authentication for J2EE web applications. Search on Bibsonomy CASCON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IP address checking, J2EE web application, SSL client certificate, certificate based authentication, multi-factor authentication
30Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Encryption systems, Local SSL, Programmable mobile chips, Mobile processors, Mobile chips, Security, Internet, Wireless communications, Wireless communications
30Ted Stanion, Carl Sechen Quasi-algebraic decompositions of switching functions. Search on Bibsonomy ARVLSI The full citation details ... 1995 DBLP  DOI  BibTeX  RDF quasi-algebraic decompositions, algebraic product, binary Boolean operation, canonical manner, SSL testable, logic testing, testability, switching functions, switching functions, state assignment, minimisation of switching nets, benchmark circuits, circuit size
28Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik Home Network Framework Based on OSGi Service Platform Using SSL Component Bundle. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Christina N. Michael, Xiao Su Incorporating a New Hash Function in OpenPGP and SSL/TLS. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Christof Fetzer, Gert Pfeifer, Trevor Jim Enhancing DNS Security using the SSL Trust Infrastructure. Search on Bibsonomy WORDS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Massimo Benerecetti, Maurizio Panti, Luca Spalazzi, Simone Tacconi Verification of the SSL/TLS Protocol Using a Model Checkable Logic of Belief and Time. Search on Bibsonomy SAFECOMP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Serge Vaudenay Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS .... Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 706 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license