|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 510 occurrences of 301 keywords
|
|
|
Results
Found 706 publication records. Showing 706 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
117 | Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwon Baik |
Design and Implementation of an SSL Component Based on CBD.  |
AsiaSim  |
2004 |
DBLP DOI BibTeX RDF |
|
115 | Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon, KyoungSoo Park |
Accelerating SSL with GPUs.  |
SIGCOMM  |
2010 |
DBLP DOI BibTeX RDF |
GPU, CUDA, SSL |
100 | Jordi Guitart, David Carrera 0001, Vicenç Beltran 0001, Jordi Torres, Eduard Ayguadé |
Session-Based Adaptive Overload Control for Secure Dynamic Web Applications.  |
ICPP  |
2005 |
DBLP DOI BibTeX RDF |
|
95 | Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrère, Abdelmalek Benzekri |
Which Web Browsers Process SSL Certificates in a Standardized Way?  |
SEC  |
2009 |
DBLP DOI BibTeX RDF |
|
95 | Ryosuke Hatsugai, Takamichi Saito |
Load-Balancing SSL Cluster Using Session Migration.  |
AINA  |
2007 |
DBLP DOI BibTeX RDF |
|
95 | Ronald Mraz |
Secure Blue: An Architecture for a Scalable, Reliable, High Volume SSL Internet Server.  |
ACSAC  |
2001 |
DBLP DOI BibTeX RDF |
|
91 | Diana Berbecaru, Antonio Lioy |
On the Robustness of Applications Based on the SSL and TLS Security Protocols.  |
EuroPKI  |
2007 |
DBLP DOI BibTeX RDF |
MITM attack, security, SSL/TLS, truncation attack |
84 | Jingli Zhou, Hongtao Xia, Jifeng Yu, Xiaofeng Wang |
Asymmetrical SSL Tunnel Based VPN.  |
ISPA  |
2006 |
DBLP DOI BibTeX RDF |
|
84 | André Adelsbach, Sebastian Gajek, Jörg Schwenk |
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures.  |
ISPEC  |
2005 |
DBLP DOI BibTeX RDF |
|
84 | Hovav Shacham, Dan Boneh |
Improving SSL Handshake Performance via Batching.  |
CT-RSA  |
2001 |
DBLP DOI BibTeX RDF |
|
81 | Homin K. Lee, Tal Malkin, Erich M. Nahum |
Cryptographic strength of ssl/tls servers: current and recent practices.  |
Internet Measurement Conference  |
2007 |
DBLP DOI BibTeX RDF |
network security, servers, ssl |
77 | Yasunori Nagasaka, Tatsumasa Kitahara, Tomoichi Takahashi |
A Proposal of Bridging Activities between RoboCupJunior and Senior Leagues.  |
RoboCup ![In: RoboCup 2008: Robot Soccer World Cup XII [papers from the 12th annual RoboCup International Symposium, Suzhou, China, July 15-18, 2008], pp. 177-188, 2008, Springer, 978-3-642-02920-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
77 | Krishna Kant 0001, Ravishankar K. Iyer, Prasant Mohapatra |
Architectural Impact of Secure Socket Layer on Internet Servers.  |
ICCD  |
2000 |
DBLP DOI BibTeX RDF |
|
73 | Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger |
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks.  |
CANS  |
2008 |
DBLP DOI BibTeX RDF |
Performance Evaluation, Network Security, Elliptic Curve Cryptography, Side-Channel Analysis, Efficient Implementation |
73 | Larry D. Bisel |
The Role of SSL in Cybersecutiry.  |
IT Prof.  |
2007 |
DBLP DOI BibTeX RDF |
|
73 | Xiaodong Lin 0001, Johnny W. Wong, Weidong Kou |
Performance Analysis of Secure Web Server Based on SSL.  |
ISW  |
2000 |
DBLP DOI BibTeX RDF |
|
69 | Adonis P. H. Fung, K. W. Cheung 0003 |
SSLock: sustaining the trust on entities brought by SSL.  |
AsiaCCS  |
2010 |
DBLP DOI BibTeX RDF |
SSL trust management, domain naming convention, man-in-the-middle attacks |
66 | Kazimierz Subieta |
Semantics of Query Languages for Network Databases.  |
ACM Trans. Database Syst.  |
1985 |
DBLP DOI BibTeX RDF |
|
64 | Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols.  |
IEEE Trans. Mob. Comput.  |
2006 |
DBLP DOI BibTeX RDF |
energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES |
64 | Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
Analyzing the energy consumption of security protocols.  |
ISLPED  |
2003 |
DBLP DOI BibTeX RDF |
energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES |
62 | Fang Qi, Zhe Tang, Guojun Wang 0001 |
Attacks vs. Countermeasures of SSL Protected Trust Model.  |
ICYCS  |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Jin-Ha Kim, Gyu Sang Choi, Chita R. Das |
An SSL Back-End Forwarding Scheme in Cluster-Based Web Servers.  |
IEEE Trans. Parallel Distributed Syst.  |
2007 |
DBLP DOI BibTeX RDF |
application server layer, cluster, Web servers, load distribution, user-level communication, Secure Sockets Layer |
62 | Claude Castelluccia, Einar Mykletun, Gene Tsudik |
Improving secure server performance by re-balancing SSL/TLS handshakes.  |
AsiaCCS  |
2006 |
DBLP DOI BibTeX RDF |
server-aided RSA, server-aided secure computation, load-balancing, denial-of-service, hardware accelerators, client puzzles |
62 | Fang Qi, Weijia Jia 0001, Feng Bao 0001, Yongdong Wu |
Batching SSL/TLS Handshake Improved.  |
ICICS  |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Nau Okamoto, Shigetomo Kimura, Yoshihiko Ebihara |
An Introduction of Compression Algorithms into SSL/TLS and Proposal of Compression Algorithms Specialized for Application.  |
AINA  |
2003 |
DBLP DOI BibTeX RDF |
|
55 | Jinhui Tang 0001, Xian-Sheng Hua 0001, Guo-Jun Qi, Tao Mei 0001, Xiuqing Wu |
Anisotropic Manifold Ranking for Video Annotation.  |
ICME  |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Kevin J. Ma, Radim Bartos |
Analysis of Transport Optimization Techniques.  |
ICWS  |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Xuehai Bian, Gregory D. Abowd, James M. Rehg |
Using Sound Source Localization in a Home Environment.  |
Pervasive  |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Vorapranee Khu-smith, Chris J. Mitchell |
Using GSM to enhance e-commerce security.  |
Workshop Mobile Commerce  |
2002 |
DBLP DOI BibTeX RDF |
GSM security, mobile or Internet payment protocol, E-commerce security |
53 | Byung kwan Lee, Tai-Chi Lee, Seung Hae Yang |
HESSL (Highly Enhanced Security Socket Layer) Protocol.  |
CEC  |
2005 |
DBLP DOI BibTeX RDF |
HESSL, F_{2^m } ECC, F_{2^m } HECC, BSB, SSL |
52 | Xuewang Zhang, Linlin Wang |
Key Technologies for Security Enhancing of Payment Gateway.  |
ISECS  |
2008 |
DBLP DOI BibTeX RDF |
payment gateway, security enhancing, fusion-based solution for SSL and SET protocols, secure hash algorithm, AES |
52 | Mohammed Assora, James Kadirire, Ayoub Shirvani |
Using WPKI for Security of Web Transaction.  |
EC-Web  |
2007 |
DBLP DOI BibTeX RDF |
Web transaction security, wireless security services, digital signature, SSL/TLS |
52 | Mohammed Assora, Ayoub Shirvani |
Enhancing the Security and Efficiency of 3-D Secure.  |
ISC  |
2006 |
DBLP DOI BibTeX RDF |
3-D Secure, password based authentication and key exchange, online transaction security, SSL/TLS |
50 | Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo Rodenhaeuser, Bruno Kaiser |
A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA).  |
KiVS  |
2007 |
DBLP DOI BibTeX RDF |
|
50 | AbdelNasir Alshamsi, Takamichi Saito |
A Technical Comparison of IPSec and SSL.  |
AINA  |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Martin Vuagnoux |
Password Interception in a SSL/TLS Channel.  |
CRYPTO  |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Vlastimil Klíma, Ondrej Pokorný, Tomás Rosa |
Attacking RSA-Based Sessions in SSL/TLS.  |
CHES  |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis |
Using SSL/TLS in authentication and key agreement procedures of future mobile networks.  |
MWCN  |
2002 |
DBLP DOI BibTeX RDF |
|
47 | Vipul Gupta, Sumit Gupta, Sheueling Chang Shantz, Douglas Stebila |
Performance analysis of elliptic curve cryptography for SSL.  |
Workshop on Wireless Security  |
2002 |
DBLP DOI BibTeX RDF |
secure socket layer (SSL), wireless, elliptic curve cryptography (ECC), internet security |
44 | Philippe Thomas |
Semi-Supervised Learning by Olivier Chapelle, Bernhard Schölkopf, and Alexander Zien (Review)  |
IEEE Trans. Neural Networks  |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Tony Jebara, Jun Wang 0006, Shih-Fu Chang |
Graph construction and b-matching for semi-supervised learning.  |
ICML  |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Kaizhu Huang, Zenglin Xu, Irwin King, Michael R. Lyu |
Semi-supervised Learning from General Unlabeled Data.  |
ICDM  |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Wen Wu, Jie Yang 0001 |
Semi-supervised learning of object categories from paired local features.  |
CIVR  |
2008 |
DBLP DOI BibTeX RDF |
semi-supervised learning, object classification |
44 | Jianguo Zhang, Fenghai Yu, Jianyong Sun, Yuanyuan Yang, Chenwen Liang |
DICOM Image Secure Communications With Internet Protocols IPv6 and IPv4.  |
IEEE Trans. Inf. Technol. Biomed.  |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Laurent Bernaille, Renata Teixeira |
Early Recognition of Encrypted Applications.  |
PAM  |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Chik How Tan, Joseph Chee Ming Teo |
Protection AgainstWeb-based Password Phishing.  |
ITNG  |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Lars Völker, Marcus Schöller |
Secure TLS: Preventing DoS Attacks with Lower Layer Authentication.  |
KiVS  |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Thawatchai Chomsiri |
HTTPS Hacking Protection.  |
AINA Workshops (1)  |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Jin-Ha Kim, Gyu Sang Choi, Chita R. Das |
A Load Balancing Scheme for Cluster-based Secure Network Servers.  |
CLUSTER  |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle |
The Design and Implementation of Protocol-Based Hidden Key Recovery.  |
ISC  |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Yoshiaki Shiraishi, Youji Fukuta, Masakatu Morii |
Remote Access VPN with Port Protection Function by Mobile Codes.  |
WISA  |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Qing Wang, Dwight J. Makaroff, H. Keith Edwards, Ryan Thompson |
Workload characterization for an E-commerce web site.  |
CASCON  |
2003 |
DBLP BibTeX RDF |
performance evaluation, electronic commerce, workload characterization |
44 | Lawrence C. Paulson |
Making Sense of Specifications: The Formalization of SET (Transcript of Discussion).  |
Security Protocols Workshop  |
2000 |
DBLP DOI BibTeX RDF |
|
44 | Robert Eschbach, Uwe Glässer, Reinhard Gotzhein, Andreas Prinz 0001 |
On the Formal Semantics of SDL-2000: A Compilation Approach Based on an Abstract SDL Machine.  |
Abstract State Machines  |
2000 |
DBLP DOI BibTeX RDF |
|
42 | Quratul-ain Mahesar, Asadullah Shah |
Securing XML Web Services by using a Proxy Web Service Model.  |
SCSS (1)  |
2007 |
DBLP DOI BibTeX RDF |
Security, Web Services, XML, SSL |
42 | Fang Qi, Feng Bao 0001, Tieyan Li, Weijia Jia 0001, Yongdong Wu |
Preventing Web-Spoofing with Automatic Detecting Security Indicator.  |
ISPEC  |
2006 |
DBLP DOI BibTeX RDF |
Automatic Detecting Security Indicator, SSL, Web Spoofing |
42 | Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi |
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.  |
WISA  |
2004 |
DBLP DOI BibTeX RDF |
degenerate divisor, scalar multiplication, timing attack, SSL, efficient computation, hyperelliptic curve cryptosystem |
42 | Daniel Bleichenbacher |
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1.  |
CRYPTO  |
1998 |
DBLP DOI BibTeX RDF |
PKCS, RSA, SSL, chosen ciphertext attack |
41 | Rolf Oppliger, Sebastian Gajek |
Effective Protection Against Phishing and Web Spoofing.  |
Communications and Multimedia Security  |
2005 |
DBLP DOI BibTeX RDF |
visual spoofing, phishing, SSL/TLS, Web spoofing |
41 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis |
Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems.  |
NETWORKING  |
2004 |
DBLP DOI BibTeX RDF |
Network Domain Security, Mobile Networks, UMTS, PKI, IPsec, SSL/TLS |
39 | Yongdong Wu, Haixia Yao, Feng Bao 0001 |
Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators.  |
SEC  |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Christiaan J. Lamprecht, Aad P. A. van Moorsel |
Runtime Security Adaptation Using Adaptive SSL.  |
PRDC  |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Christiaan J. Lamprecht, Aad P. A. van Moorsel |
Adaptive SSL: Design, Implementation and Overhead Analysis.  |
SASO  |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Yongdong Wu, Feng Bao 0001 |
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes.  |
Inscrypt  |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski |
Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks.  |
CANS  |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Hugo Krawczyk |
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?).  |
CRYPTO  |
2001 |
DBLP DOI BibTeX RDF |
|
39 | Zhimin Song, Sihan Qing |
Applying NCP Logic to the Analysis of SSL 3.0.  |
ICICS  |
2001 |
DBLP DOI BibTeX RDF |
|
37 | Yoonyoung Lee, Soonhaeng Hur, Dongho Won, Seungjoo Kim |
Cipher Suite Setting Problem of SSL Protocol and it's Solutions.  |
AINA Workshops  |
2009 |
DBLP DOI BibTeX RDF |
Cipher Suite, Security, SSL, Secure Socket Layer |
36 | Rolf Oppliger, Ralf Hauser, David A. Basin |
SSL/TLS Session-Aware User Authentication.  |
Computer  |
2008 |
DBLP DOI BibTeX RDF |
man-in-the-middle (MITM) attacks, SSL/TLS protocols, security, user authentication |
35 | Merve Melis Simsek, Tamer Ergun, Hüseyin Temuçin |
SSL Test Suite: SSL Certificate Test Public Key Infrastructure.  |
SIU  |
2022 |
DBLP DOI BibTeX RDF |
|
35 | Wai-Kong Lee, Xian-Fu Wong, Bok-Min Goi, Raphael C.-W. Phan |
CUDA-SSL: SSL/TLS accelerated by GPU.  |
ICCST  |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Ren Zhao, Xiaohong Li 0001, Guangquan Xu, Zhiyong Feng 0002, Jianye Hao |
E-SSL: An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet.  |
SOFL+MSVL  |
2016 |
DBLP DOI BibTeX RDF |
|
35 | Sirikarn Pukkawanna, Gregory Blanc, Joaquín García-Alfaro, Youki Kadobayashi, Hervé Debar |
Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment.  |
BADGERS@ESORICS  |
2014 |
DBLP DOI BibTeX RDF |
|
35 | Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum |
Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes.  |
IACR Cryptol. ePrint Arch.  |
2006 |
DBLP BibTeX RDF |
|
33 | Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy |
TruWallet: trustworthy and migratable wallet-based web authentication.  |
STC  |
2009 |
DBLP DOI BibTeX RDF |
password wallet, secure migration, trusted computing, phishing, identity theft |
33 | Kai Zhang 0001, James T. Kwok, Bahram Parvin |
Prototype vector machine for large scale semi-supervised learning.  |
ICML  |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Takamichi Saito, Kiyomi Sekiguchi, Ryosuke Hatsugai |
Authentication Binding between TLS and HTTP.  |
NBiS  |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Ben Adida |
Sessionlock: securing web sessions against eavesdropping.  |
WWW  |
2008 |
DBLP DOI BibTeX RDF |
web security |
33 | Haixin Wang, Guoqiang Bai 0001, Hongyi Chen |
Zodiac: System architecture implementation for a high-performance Network Security Processor.  |
ASAP  |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner 0001 |
Dynamic pharming attacks and locked same-origin policies for web browsers.  |
CCS  |
2007 |
DBLP DOI BibTeX RDF |
same-origin policy, pharming, web authentication |
33 | Meng Wang 0001, Xian-Sheng Hua 0001, Xun Yuan 0001, Yan Song 0001, Li-Rong Dai 0001 |
Optimizing multi-graph learning: towards a unified video annotation scheme.  |
ACM Multimedia  |
2007 |
DBLP DOI BibTeX RDF |
semi-supervised learning, video annotation, multimodal fusion |
33 | Camille Gaspard, Batoul Haidar, Ayman I. Kayssi, Ali Chehab |
SmartSSL: Efficient Policy-Based Web Security.  |
AICCSA  |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Takamichi Saito, Ryosuke Hatsugai, Toshiyuki Kito |
On Compromising Password-Based Authentication over HTTPS.  |
AINA (1)  |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Vipul Gupta, Matthew Millard, Stephen Fung, Yu Zhu, Nils Gura, Hans Eberle, Sheueling Chang Shantz |
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper).  |
PerCom  |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong |
HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment.  |
ICCSA (2)  |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong |
HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment.  |
ICCSA (2)  |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Ronald D. Blanton, John P. Hayes |
On the properties of the input pattern fault model.  |
ACM Trans. Design Autom. Electr. Syst.  |
2003 |
DBLP DOI BibTeX RDF |
fault testing, testing digital circuits, ATPG, fault models, faults, defects |
33 | Vorapranee Khu-smith, Chris J. Mitchell |
Enhancing E-commerce Security Using GSM Authentication.  |
EC-Web  |
2003 |
DBLP DOI BibTeX RDF |
E-commerce transactions security, GSM security, payment protocol |
33 | Takamichi Saito, Kentaro Umesawa, Toshiyuki Kito, Hiroshi G. Okuno |
Privacy-Enhanced SPKI Access Control on PKIX and Its Application to Web Server .  |
AINA  |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Lawrence C. Paulson |
Inductive Analysis of the Internet Protocol TLS (Position Paper).  |
Security Protocols Workshop  |
1998 |
DBLP DOI BibTeX RDF |
|
33 | Mark C. Hansen, John P. Hayes |
High-level test generation using physically-induced faults.  |
VTS  |
1995 |
DBLP DOI BibTeX RDF |
high-level test generation, physically-induced faults, industry-standard single stuck-line faults, independent functional faults, near-minimal size, fault diagnosis, logic testing, integrated circuit testing, design for testability, automatic testing, functional tests, failure analysis, benchmark circuits, circuit under test |
31 | Nabil Schear, David M. Nicol |
Performance Analysis of Real Traffic Carried with Encrypted Cover Flows.  |
PADS  |
2008 |
DBLP DOI BibTeX RDF |
security, discrete-event simulation, traffic analysis, network modeling, SSL |
30 | Heesun Park, Stan Redford |
Client certificate and IP address based multi-factor authentication for J2EE web applications.  |
CASCON  |
2007 |
DBLP DOI BibTeX RDF |
IP address checking, J2EE web application, SSL client certificate, certificate based authentication, multi-factor authentication |
30 | Linda Dailey Paulson |
News Briefs.  |
Computer  |
2005 |
DBLP DOI BibTeX RDF |
Encryption systems, Local SSL, Programmable mobile chips, Mobile processors, Mobile chips, Security, Internet, Wireless communications, Wireless communications |
30 | Ted Stanion, Carl Sechen |
Quasi-algebraic decompositions of switching functions.  |
ARVLSI  |
1995 |
DBLP DOI BibTeX RDF |
quasi-algebraic decompositions, algebraic product, binary Boolean operation, canonical manner, SSL testable, logic testing, testability, switching functions, switching functions, state assignment, minimisation of switching nets, benchmark circuits, circuit size |
28 | Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik |
Home Network Framework Based on OSGi Service Platform Using SSL Component Bundle.  |
CIT  |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Christina N. Michael, Xiao Su |
Incorporating a New Hash Function in OpenPGP and SSL/TLS.  |
ITNG  |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Christof Fetzer, Gert Pfeifer, Trevor Jim |
Enhancing DNS Security using the SSL Trust Infrastructure.  |
WORDS  |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Massimo Benerecetti, Maurizio Panti, Luca Spalazzi, Simone Tacconi |
Verification of the SSL/TLS Protocol Using a Model Checkable Logic of Belief and Time.  |
SAFECOMP  |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Serge Vaudenay |
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS ....  |
EUROCRYPT  |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 706 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ >>] |
|