The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for WTLS with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1999-2004 (17) 2005-2015 (11)
Publication types (Num. hits)
article(5) incollection(1) inproceedings(22)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 58 occurrences of 39 keywords

Results
Found 28 publication records. Showing 28 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
190Albert Levi, Erkay Savas Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
159Bin Li A Forward-Secrecy WTLS Handshake Protocol Based on XTR. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF WTLS, Intermediator Attack, Forward Secrecy, XTR
159Jin Kwak, Jongsu Han, Soohyun Oh, Dongho Won Security Enhanced WTLS Handshake Protocol. Search on Bibsonomy ICCSA (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF WTLS, WAP, active attack, Handshake protocol
91Phongsak Prasithsangaree, Prashant Krishnamurthy A Variation of the WTLS Authentication Protocol for Reducing Energy Consumption in Wireless Devices. Search on Bibsonomy HSNMC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
91Dong Jin Kwak, JaeCheol Ha, Hoon-Jae Lee 0001, Hwankoo Kim, Sang-Jae Moon A WTLS Handshake Protocol with User Anonymity and Forward Secrecy. Search on Bibsonomy CDMA International Conference The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
88Nicolas Sklavos 0001, Paris Kitsos, K. Papadopoulos, Odysseas G. Koufopavlou Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security. Search on Bibsonomy J. Supercomput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF WTLS implementation, WAP security, wireless networks, wireless communications, security system
52Serge Vaudenay Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS .... Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
52Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS. Search on Bibsonomy ICOIN The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
52Ian Herwono, Ingo Liebhardt Performance of WTLS and Its Impact on an M-commerce Transaction. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
40Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae Security Enhancement on Mobile Commerce. Search on Bibsonomy Human.Society@Internet The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32Tianjun Wu, Yong Ge, Jianghao Wang, Alfred Stein, Yongze Song, Yunyan Du, Jiang-Hong Ma A WTLS-Based Method for Remote Sensing Imagery Registration. Search on Bibsonomy IEEE Trans. Geosci. Remote. Sens. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
32Yijun He, Moon-Chuen Lee Improving WTLS Security for WAP Based Mobile e-Commerce. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Ruishan Zhang, Kefei Chen Improvements on the WTLS protocol to avoid denial of service attacks. Search on Bibsonomy Comput. Secur. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Burak Bayoglu, Albert Levi, Erkay Savas Performance Evaluation of End-to-End Security in Wireless Applications using WTLS Handshake Protocol. Search on Bibsonomy New Trends in Computer Networks The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Michael Bungert, Oliver Pfaff Das WAP-Sicherheitsprotokoll WTLS. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 1999 DBLP  BibTeX  RDF
32Markku-Juhani Olavi Saarinen Attacks against the WAP WTLS protocol. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 1999 DBLP  BibTeX  RDF
28Anand Raghunathan, Nachiketh R. Potlapally, Srivaths Ravi 0001 Securing Wireless Data: System Architecture Challenges. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing
28Hiroto Yasuura, Hiroyuki Tomiyama, Takanori Okuma, Yun Cao Data Memory Design Considering Effective Bitwidth for Low-Energy Embedded Systems. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing
20Billy Bob Brumley, Kimmo U. Järvinen Fast Point Decompression for Standard Elliptic Curves. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF square roots modulo p, elliptic curve cryptography, exponentiation, addition chains
20Yijun He, Nan Xu, Jie Li A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Sungduk Kim, Kyungjin Kim, Jaedong Jung, Dongho Won An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF proof of possession, signcryption, POP
20Chih-Ming Yan, Wen-Chen Sun, Tzu-Yen Wang, Tzu-Han Kao, Shyan-Ming Yuan Design and Implementation of WAP Certificate Converter Toolkit. Search on Bibsonomy MDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho Formal analysis of card-based payment systems in mobile devices. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF card-based systems, formal verification, mobile payment, electronic payments
20Katsuyuki Takashima New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Ramesh Karri, Piyush Mishra Analysis of Energy Consumed by Secure Session Negotiation Protocols in Wireless Networks. Search on Bibsonomy PATMOS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Gökhan Kahraman, Semih Bilgen Wireless Application Protocol Transport Layer Performance. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Louis Goubin A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards
20Jong-Phil Yang, Weon Shin, Kyung Hyune Rhee An End-to-End Authentication Protocol in Wireless Application Protocol. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #28 of 28 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license