The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for TLS with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-1996 (17) 1998-1999 (15) 2000-2001 (26) 2002 (22) 2003 (30) 2004 (21) 2005 (46) 2006 (64) 2007 (40) 2008 (60) 2009 (31) 2010 (36) 2011 (36) 2012 (32) 2013 (29) 2014 (43) 2015 (68) 2016 (75) 2017 (73) 2018 (85) 2019 (98) 2020 (86) 2021 (99) 2022 (101) 2023 (113) 2024 (13)
Publication types (Num. hits)
article(585) data(1) incollection(7) inproceedings(755) phdthesis(11)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 373 occurrences of 242 keywords

Results
Found 1359 publication records. Showing 1359 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
159Cristian Coarfa, Peter Druschel, Dan S. Wallach Performance analysis of TLS Web servers. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA accelerator, secure Web servers, Internet, e-commerce, TLS
110Cosmin E. Oancea, Alan Mycroft, Tim Harris 0001 A lightweight in-place implementation for software thread-level speculation. Search on Bibsonomy SPAA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF roll-back, thread-level speculation (tls)
102Venkatesan Packirisamy, Yangchun Luo, Wei-Lung Hung, Antonia Zhai, Pen-Chung Yew, Tin-Fook Ngai Efficiency of thread-level speculation in SMT and CMP architectures - performance, power and thermal perspective. Search on Bibsonomy ICCD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
102Manohar K. Prabhu, Kunle Olukotun Exposing speculative thread parallelism in SPEC2000. Search on Bibsonomy PPoPP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SPEC CPU2000, feedback-driven optimization, manual parallel programming, chip multiprocessors, multithreading, thread-level speculation
101Wei Liu 0014, James Tuck 0001, Luis Ceze, Wonsun Ahn, Karin Strauss, Jose Renau, Josep Torrellas POSH: a TLS compiler that exploits program structure. Search on Bibsonomy PPoPP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TLS compiler, profiling, prefetching, thread-level speculation, multi-core architecture
96Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo Rodenhaeuser, Bruno Kaiser A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA). Search on Bibsonomy KiVS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
93Jose Renau, James Tuck 0001, Wei Liu 0014, Luis Ceze, Karin Strauss, Josep Torrellas Tasking with out-of-order spawn in TLS chip multiprocessors: microarchitecture and compilation. Search on Bibsonomy ICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
91Christopher J. F. Pickett, Clark Verbrugge Software Thread Level Speculation for the Java Language and Virtual Machine Environment. Search on Bibsonomy LCPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
82Lawrence C. Paulson Inductive Analysis of the Internet Protocol TLS (Position Paper). Search on Bibsonomy Security Protocols Workshop The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
79Jose Renau, Karin Strauss, Luis Ceze, Wei Liu 0014, Smruti R. Sarangi, James Tuck 0001, Josep Torrellas Thread-Level Speculation on a CMP can be energy efficient. Search on Bibsonomy ICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
79Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk Universally Composable Security Analysis of TLS. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF TLS/SSL, secure sessions, key exchange, Universal Composability
79Diana Berbecaru, Antonio Lioy On the Robustness of Applications Based on the SSL and TLS Security Protocols. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MITM attack, security, SSL/TLS, truncation attack
71David J. Boyd TLS client handshake with a payment card. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
71Daigo Manabe, Shigetomo Kimura, Yoshihiko Ebihara A Compression Method Designed for SMTP over TLS. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
68Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval Provably secure password-based authentication in TLS. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encrypted key exchange, password authentication, TLS
68Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell A modular correctness proof of IEEE 802.11i and TLS. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF protocol composition logic, TLS, IEEE 802.11i
68Jakob Jonsson, Burton S. Kaliski Jr. On the Security of RSA Encryption in TLS. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF key encapsulation, RSA encryption, TLS
68Lawrence C. Paulson Inductive Analysis of the Internet Protocol TLS. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF inductive method, proof tools, authentication, TLS, Isabelle
68Liangmin Zhou, Lijing Lin, Yiming Wei 0001, Sanzheng Qiao Perturbation analysis and condition numbers of scaled total least squares problems. Search on Bibsonomy Numer. Algorithms The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classifications (2000) 65F20, 65F35
68Arun Kejariwal, Xinmin Tian, Wei Li 0015, Milind Girkar, Sergey Kozhukhov, Hideki Saito 0001, Utpal Banerjee, Alexandru Nicolau, Alexander V. Veidenbaum, Constantine D. Polychronopoulos On the performance potential of different types of speculative thread-level parallelism: The DL version of this paper includes corrections that were not made available in the printed proceedings. Search on Bibsonomy ICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DOALL loops, value dependence, performance evaluation, data dependence, speculative execution, control dependence
68Sang Keun Yoo, Hyun Gon Kim Analysis and Design of Secure and Reliable Transmission Protocol in Diameter. Search on Bibsonomy CDMA International Conference The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
68Minghui Xia, Eli Saber, Gaurav Sharma 0001, A. Murat Tekalp End-to-end color printer calibration by total least squares regression. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
67Yijun Zeng, Omar Cherkaoui Performance Study of COPS over TLS and IPsec Secure Session. Search on Bibsonomy DSOM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF IPsec and TLS, COPS
59Kutluyil Dogancay Relationship Between Geometric Translations and TLS Estimation Bias in Bearings-Only Target Localization. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
59Lars Völker, Marcus Schöller Secure TLS: Preventing DoS Attacks with Lower Layer Authentication. Search on Bibsonomy KiVS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
59Nau Okamoto, Shigetomo Kimura, Yoshihiko Ebihara An Introduction of Compression Algorithms into SSL/TLS and Proposal of Compression Algorithms Specialized for Application. Search on Bibsonomy AINA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
57Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk Provably secure browser-based user-aware mutual authentication over TLS. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF browser-based protocols, phishing, user authentication, TLS
57Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer HMAC is a randomness extractor and applications to TLS. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key extraction, TLS, HMAC, randomness extraction
57Karthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu Cryptographically verified implementations for TLS. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF verified implementations, authentication, cryptographic protocols, SSL, TLS, secrecy
57Sebastian Gajek, Lijun Liao, Jörg Schwenk Stronger TLS bindings for SAML assertions and SAML artifacts. Search on Bibsonomy SWS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF client certificate, fim, saml, tls
57Hovav Shacham, Dan Boneh, Eric Rescorla Client-side caching for TLS. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF session cache, wireless networks, Bloom filters, TLS
57Kevin J. Ma, Radim Bartos Analysis of Transport Optimization Techniques. Search on Bibsonomy ICWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
57Stanley L. C. Fung, J. Gregory Steffan Improving cache locality for thread-level speculation. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
57André Adelsbach, Sebastian Gajek, Jörg Schwenk Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
57Vorapranee Khu-smith, Chris J. Mitchell Using GSM to enhance e-commerce security. Search on Bibsonomy Workshop Mobile Commerce The full citation details ... 2002 DBLP  DOI  BibTeX  RDF GSM security, mobile or Internet payment protocol, E-commerce security
54Mohamad Badra, Samer El-Sawda, Ibrahim Hajjeh Phishing attacks and solutions. Search on Bibsonomy MobiMedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RSA, phishing, public key infrastructures, TLS, Diffie-Hellman, SRP
54Georgios Kambourakis, Angelos N. Rouskas, Dimitris Gritzalis Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF AKA, WLAN, UMTS, PKI, TLS, EAP
53Seong-Soo Park 0001, Jong-Hyouk Lee, Tai-Myoung Chung Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment. Search on Bibsonomy ICCSA (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Proxy MIPv6, EAP-TLS, Authentication, Certificate, BAN Logic
53Frederik Armknecht, Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Gianluca Ramunno, Davide Vernizzi An efficient implementation of trusted channels based on openssl. Search on Bibsonomy STC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF openSSL, transport layer security (TLS), trusted channel, trusted computing (TC), attestation
53Mohammed Assora, James Kadirire, Ayoub Shirvani Using WPKI for Security of Web Transaction. Search on Bibsonomy EC-Web The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web transaction security, wireless security services, digital signature, SSL/TLS
53Mohammed Assora, Ayoub Shirvani Enhancing the Security and Efficiency of 3-D Secure. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 3-D Secure, password based authentication and key exchange, online transaction security, SSL/TLS
48Takamichi Saito, Kiyomi Sekiguchi, Ryosuke Hatsugai Authentication Binding between TLS and HTTP. Search on Bibsonomy NBiS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Sepideh Fouladgar, Bastien Mainaud, Khaled Masmoudi, Hossam Afifi Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Yun Dai, Ren Zhang 0002, Yan-Xia Lin The Probability Distribution of Distance TSS-TLS Is Organism Characteristic and Can Be Used for Promoter Prediction. Search on Bibsonomy IEA/AIE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Martin Vuagnoux Password Interception in a SSL/TLS Channel. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
48Vlastimil Klíma, Ondrej Pokorný, Tomás Rosa Attacking RSA-Based Sessions in SSL/TLS. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
48Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis Using SSL/TLS in authentication and key agreement procedures of future mobile networks. Search on Bibsonomy MWCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
45Venkatesan Packirisamy, Antonia Zhai, Wei-Chung Hsu, Pen-Chung Yew, Tin-Fook Ngai Exploring speculative parallelism in SPEC2006. Search on Bibsonomy ISPASS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
45Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, John McLean Applying Formal Methods to a Certifiably Secure Software System. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, verification, Formal methods, Specification, Software, tools, software verification, security kernels
45Jianguo Zhang, Fenghai Yu, Jianyong Sun, Yuanyuan Yang, Chenwen Liang DICOM Image Secure Communications With Internet Protocols IPv6 and IPv4. Search on Bibsonomy IEEE Trans. Inf. Technol. Biomed. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Mark Grechanik, Kathryn S. McKinley, Dewayne E. Perry Recovering and using use-case-diagram-to-source-code traceability links. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF LeanArt, traceability links, machine learning, program analysis, use case diagram
45Yaobin Wang, Hong An, Bo Liang, Li Wang, Ming Cong, Yongqing Ren Balancing Thread Partition for Efficiently Exploiting Speculative Thread-Level Parallelism. Search on Bibsonomy APPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Arun Kejariwal, Xinmin Tian, Milind Girkar, Wei Li 0015, Sergey Kozhukhov, Utpal Banerjee, Alexandru Nicolau, Alexander V. Veidenbaum, Constantine D. Polychronopoulos Tight analysis of the performance potential of thread speculation using spec CPU 2006. Search on Bibsonomy PPoPP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF conflict probability, misspeculation penalty, threading overhead, performance evaluation, speculative execution
45Wei Xing Zheng 0001 On noisy FIR filtering via total least squares estimation. Search on Bibsonomy ISCAS (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
45Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle The Design and Implementation of Protocol-Based Hidden Key Recovery. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
45Manohar K. Prabhu, Kunle Olukotun Using thread-level speculation to simplify manual parallelization. Search on Bibsonomy PPoPP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF feedback-driven optimization, manual parallel programming, chip multiprocessor, multithreading, data speculation
45Jovanka Ciric, Gin Yee, Carl Sechen Delay Minimization and Technology Mapping of Two-Level Structures and Implementation Using Clock-Delayed Domino Logic. Search on Bibsonomy DATE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
43Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, N. Asokan Beyond secure channels. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF state changes, trusted channel, virtualization, trusted computing, hypervisor, TLS, microkernel, remote attestation, relay attack
43Yu Gu 0003, Wei Zhang, Hengchang Liu, Baohua Zhao, Yugui Qu Energy-Efficient Target Localization Based on a Prediction Model. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF wireless sensor networks, energy-efficient, prediction model, TLS
42Dimitri Mankowski, Thom Wiggers, Veelasha Moonsamy TLS â†' Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
42Dimitri Mankowski, Thom Wiggers, Veelasha Moonsamy TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
42Li Yan 0003, Junxiang Tan, Hua Liu 0002, Hong Xie 0002, Changjun Chen Automatic Registration of TLS-TLS and TLS-MLS Point Clouds Using a Genetic Algorithm. Search on Bibsonomy Sensors The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
42Yuanyuan Zhou 0001, Pin Zhou, Feng Qin, Wei Liu 0014, Josep Torrellas Efficient and flexible architectural support for dynamic monitoring. Search on Bibsonomy ACM Trans. Archit. Code Optim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dynamic monitoring, thread-level speculation (TLS), software debugging, Architectural support
42Ulrike Meyer, Jared Cordasco, Susanne Wetzel An approach to enhance inter-provider roaming through secret sharing and its application to WLANs. Search on Bibsonomy WMASH The full citation details ... 2005 DBLP  DOI  BibTeX  RDF EAP-TLS-KS, distributed DSS, inter-provider roaming, micropayment scheme, WLAN, secret sharing, PKI, 802.11i
42Rolf Oppliger, Sebastian Gajek Effective Protection Against Phishing and Web Spoofing. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF visual spoofing, phishing, SSL/TLS, Web spoofing
37Chao Lv, Hui Li 0006, Jianfeng Ma 0001 Analysis the Properties of TLS Based on Temporal Logic of Knowledge. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Paul Rabinovich ECL: A TLS Extension for Authentication in Complex PKIs. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Homin K. Lee, Tal Malkin, Erich M. Nahum Cryptographic strength of ssl/tls servers: current and recent practices. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF network security, servers, ssl
37Baris Kayayurt, Tugkan Tuglular End-to-end security implementation for mobile devices using TLS protocol. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Arvind Nayak, Emanuele Trucco, Neil A. Thacker When are Simple LS Estimators Enough? An Empirical Study of LS, TLS, and GTLS. Search on Bibsonomy Int. J. Comput. Vis. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF generalized total least squares, 2-D homography, correlated noise, least squares, total least squares
37Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Kazuhiro Ogata 0001, Kokichi Futatsugi Equational Approach to Formal Analysis of TLS. Search on Bibsonomy ICDCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, verification, algebraic specification, rewriting, interactive theorem proving
37Gregorio Díaz 0001, Fernando Cuartero, Valentín Valero Ruiz, Fernando L. Pelayo Automatic verification of the TLS handshake protocol. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authentication protocols and model checking, system verification and model checking, security, e-Commerce, authentication protocols
37Christoph S. Garbe, Hagen Spies, Bernd Jähne Mixed OLS-TLS for the Estimation of Dynamic Processes with a Linear Source Term. Search on Bibsonomy DAGM-Symposium The full citation details ... 2002 DBLP  DOI  BibTeX  RDF brightness change, parameter estimation, optical flow, least squares, dynamic processes
37Michael Steiner 0001, Peter Buhler, Thomas Eirich, Michael Waidner Secure password-based cipher suite for TLS. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF transport layer security, weak secret, password, key agreement, dictionary attack, Authenticated key exchange, perfect forward secrecy, secure channel
34Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek Secure Bindings of SAML Assertions to TLS Sessions. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Authentication, Single-Sign-On, SSL, SAML, TLS, Kerberos, Federated Identity Management
34Xiangyu Kong, Chang-Hua Hu, Chongzhao Han A Self-Stabilizing Neural Algorithm for Total Least Squares Filtering. Search on Bibsonomy Neural Process. Lett. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Total least square filtering, Linear system identification, Adaptive algorithm, FIR filters
34Polychronis Xekalakis, Nikolas Ioannou, Marcelo Cintra Combining thread level speculation helper threads and runahead execution. Search on Bibsonomy ICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-cores, thread-level speculation, helper threads, runahead execution
34Antonia Zhai, J. Gregory Steffan, Christopher B. Colohan, Todd C. Mowry Compiler and hardware support for reducing the synchronization of speculative threads. Search on Bibsonomy ACM Trans. Archit. Code Optim. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF automatic parallelization, instruction scheduling, Thread-level speculation, chip-multiprocessing
34Peng Wu 0001, Arun Kejariwal, Calin Cascaval Compiler-Driven Dependence Profiling to Guide Program Parallelization. Search on Bibsonomy LCPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Mihai Burcea, J. Gregory Steffan, Cristiana Amza The potential for variable-granularity access tracking for optimistic parallelism. Search on Bibsonomy MSPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dependence tracking, variable granularity, transactional memory, thread-level speculation
34Christopher B. Colohan, Anastassia Ailamaki, J. Gregory Steffan, Todd C. Mowry CMP Support for Large and Dependent Speculative Threads. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF databases, Multiprocessor Systems, cache coherence, thread-level speculation
34Md. Mafijul Islam Predicting Loop Termination to Boost Speculative Thread-Level Parallelism in Embedded Applications. Search on Bibsonomy SBAC-PAD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Keigo Hirakawa, Thomas W. Parks Image denoising using total least squares. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, John D. McLean Formal specification and verification of data separation in a separation kernel for an embedded system. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF code verification, formal specification, theorem proving, formal model, separation kernel
34Christopher B. Colohan, Anastassia Ailamaki, J. Gregory Steffan, Todd C. Mowry Tolerating Dependences Between Large Speculative Threads Via Sub-Threads. Search on Bibsonomy ISCA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34J. Gregory Steffan, Christopher B. Colohan, Antonia Zhai, Todd C. Mowry The STAMPede approach to thread-level speculation. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cache coherence, automatic parallelization, Thread-level speculation, chip-multiprocessing
34Matthias Mühlich, Rudolf Mester A Fast Algorithm for Statistically Optimized Orientation Estimation. Search on Bibsonomy DAGM-Symposium The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Braxton Thomason, Craig Chase Partially ordered epochs for thread-level speculation. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF partially-ordered threads, automatic parallelization, thread-level speculation
34Phongsak Prasithsangaree, Prashant Krishnamurthy A Variation of the WTLS Authentication Protocol for Reducing Energy Consumption in Wireless Devices. Search on Bibsonomy HSNMC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Pino Persiano, Ivan Visconti A secure and private system for subscription-based remote services. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptographic algorithms and protocols, privacy, world-wide web, Access control, anonymity
34Michael K. Chen, Kunle Olukotun TEST: A Tracer for Extracting Speculative Thread. Search on Bibsonomy CGO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Vorapranee Khu-smith, Chris J. Mitchell Enhancing E-commerce Security Using GSM Authentication. Search on Bibsonomy EC-Web The full citation details ... 2003 DBLP  DOI  BibTeX  RDF E-commerce transactions security, GSM security, payment protocol
34J. Gregory Steffan, Christopher B. Colohan, Antonia Zhai, Todd C. Mowry Improving Value Communication for Thread-Level Speculation. Search on Bibsonomy HPCA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF parallelization, multithreaded, Speculation, value prediction
34Antonia Zhai, Christopher B. Colohan, J. Gregory Steffan, Todd C. Mowry Compiler optimization of scalar value communication between speculative threads. Search on Bibsonomy ASPLOS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
33Rolf Oppliger, Ralf Hauser, David A. Basin SSL/TLS Session-Aware User Authentication. Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF man-in-the-middle (MITM) attacks, SSL/TLS protocols, security, user authentication
32Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mathew Eszenyi, Shay Gueron, David Durham Encrypting the internet. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF GCM, cryptographic algorithm acceleration, AES, RSA, HTTPS, secure communications, SSL, TLS
31K. R. Jayaram, Aditya P. Mathur On the Adequacy of Statecharts as a Source of Tests for Cryptographic Protocols. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF TLS protocol, MC/DC coverage, Security protocol, Statechart, Security Vulnerability
31Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Network Domain Security, Mobile Networks, UMTS, PKI, IPsec, SSL/TLS
28M. E. Abdelhafez, Sureswaran Ramadass, Mustafa Abdelwahab TLS Guard for TLS 1.3 zero round-trip time (0-RTT) in a distributed environment. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1359 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license