The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for SSL with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1997 (17) 1998-2000 (22) 2001 (16) 2002 (23) 2003 (24) 2004 (33) 2005 (50) 2006 (51) 2007 (44) 2008 (45) 2009 (30) 2010 (18) 2011 (27) 2012 (17) 2013 (17) 2014 (22) 2015 (23) 2016 (21) 2017 (17) 2018 (30) 2019 (29) 2020-2021 (39) 2022 (30) 2023 (46) 2024 (15)
Publication types (Num. hits)
article(198) incollection(5) inproceedings(500) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 510 occurrences of 301 keywords

Results
Found 706 publication records. Showing 706 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Damiano Bolzoni Indicators of Malicious SSL Connections. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Omar Nakhila, Erich Dondyk, Muhammad Faisal Amjad, Cliff C. Zou User-side Wi-Fi Evil Twin Attack detection using SSL/TCP protocols. Search on Bibsonomy CCNC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Sung-Min Kim, Young-Hoon Goo, Myung-Sup Kim, Soo-Gil Choi, Mi-Jung Choi A method for service identification of SSL/TLS encrypted traffic with the relation of session ID and Server IP. Search on Bibsonomy APNOMS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Mikhail Zolotukhin, Timo Hämäläinen 0002, Tero Kokkonen, Antti Niemelä, Jarmo Siltanen Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol. Search on Bibsonomy NEW2AN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Boyuan He, Vaibhav Rastogi, Yinzhi Cao, Yan Chen 0004, V. N. Venkatakrishnan, Runqing Yang, Zhenrui Zhang Vetting SSL Usage in Applications with SSLINT. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Pernelle Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, Youki Kadobayashi AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS. Search on Bibsonomy BADGERS@RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Jing Wang, Ying Yang, Lijuan Chen, Guang Yang, Zhenya Chen, Liqiang Wen A Combination of Timing Attack and Statistical Method to Reduce Computational Complexities of SSL/TLS Side-Channel Attacks. Search on Bibsonomy CIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Lucky Onwuzurike, Emiliano De Cristofaro Danger is my middle name: experimenting with SSL vulnerabilities in Android apps. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Yun Ding SSL sicher implementieren. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Vasant Tendulkar, William Enck An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
17Rourab Paul, Amlan Chakrabarti, Ranjan Ghosh Multi Core SSL/TLS Security Processor Architecture Prototype Design with automated Preferential Algorithm in FPGA. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
17Richard Hartmann Default Port for Internet Relay Chat (IRC) via TLS/SSL. Search on Bibsonomy RFC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Yuji Suga SSL/TLS Servers Status Survey about Enabling Forward Secrecy. Search on Bibsonomy NBiS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Adam Bates 0001, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Kevin R. B. Butler, Abdulrahman Alkhelaifi Securing SSL Certificate Verification through Dynamic Linking. Search on Bibsonomy CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Sascha Fahl, Yasemin Acar, Henning Perl, Matthew Smith 0001 Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jörg Schwenk, Sebastian Schinzel, Erik Tews Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2014 DBLP  BibTeX  RDF
17David Sounthiraraj, Justin Sahs, Garret Greenwood, Zhiqiang Lin, Latifur Khan SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
17Adrienne Porter Felt, Robert W. Reeder, Hazim Almuhimedi, Sunny Consolvo Experimenting at scale with google chrome's SSL warning. Search on Bibsonomy CHI The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Yun-An Chang, Ming-Shing Chen, Jong-Shian Wu, Bo-Yin Yang Postquantum SSL/TLS for Embedded Systems. Search on Bibsonomy SOCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17John Hubbard, Ken Weimer, Yu Chen 0002 A study of SSL Proxy attacks on Android and iOS mobile applications. Search on Bibsonomy CCNC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Christopher W. Brown 0001, Michael Jenkins Analyzing Proposals for Improving Authentication on the TLS/SSL-Protected Web. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Yuji Suga Visualization of SSL Setting Status Such as the FQDN Mismatch. Search on Bibsonomy IMIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Lin-Shung Huang, Alex Rice, Erling Ellingsen, Collin Jackson Analyzing Forged SSL Certificates in the Wild. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Chad Brubaker, Suman Jana, Baishakhi Ray, Sarfraz Khurshid, Vitaly Shmatikov Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Jae-Pil Lee, Young-Hyuk Kim, Jae-Kwang Lee SSL Application for Managed Security between the Mobile and HIS Biometric Information Collection Client. Search on Bibsonomy AINA Workshops The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Arno Fiedler, Christoph Thiel The need of European White Knights for the TLS/SSL Certificate System. Search on Bibsonomy ISSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Hui Liu, Yuanyuan Zhang 0002, Hui Wang 0037, Wenbo Yang, Juanru Li, Dawu Gu TagDroid: Hybrid SSL Certificate Verification in Android. Search on Bibsonomy ICICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Liang Zhang 0022, David R. Choffnes, Dave Levin, Tudor Dumitras, Alan Mislove, Aaron Schulman, Christo Wilson Analysis of SSL certificate reissues and revocations in the wake of heartbleed. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Adam Bates 0001, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Kevin R. B. Butler Forced Perspectives: Evaluating an SSL Trust Enhancement at Scale. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
17Fang Qi, Zhe Tang, Guojun Wang 0001, Jie Wu 0001 User requirements-aware security ranking in SSL protocol. Search on Bibsonomy J. Supercomput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Kevin Benton, Ty Bross Timing Analysis of SSL/TLS Man in the Middle Attacks. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
17Mauro Conti, Nicola Dragoni, Sebastiano Gottardo MITHYS: Mind The Hand You Shake - Protecting mobile devices from SSL usage vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
17Jiri Jakovenko, J. Formánek, X. Perpiñà, Xavier Jordà, Miquel Vellvehí, Robert J. Werkhoven, Miroslav Husák, J. M. G. Kunen, P. Bancken, P. J. Bolt, A. Gasse Design methodologies for reliability of SSL LED boards. Search on Bibsonomy Microelectron. Reliab. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Christopher Meyer, Jörg Schwenk Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
17Sascha Fahl, Marian Harbach, Henning Perl, Markus Koetter, Matthew Smith 0001 Rethinking SSL development in an appified world. Search on Bibsonomy CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17D. Mooloo, T. P. Fowdur An SSL-based client-oriented anti-spoofing email application. Search on Bibsonomy AFRICON The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Ali Aydin Selçuk Trusting SSL in practice. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Roy Fisher, Gerhard P. Hancke 0002 SSL Usage in Commercial Internet of Things Platforms. Search on Bibsonomy RFIDSec Asia The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Andrea Micheloni, Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath Laribus: Privacy-Preserving Detection of Fake SSL Certificates with a Social P2P Notary Network. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Mauro Conti, Nicola Dragoni, Sebastiano Gottardo MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities. Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Eizen Kimura, Masato Saito, Kazukuni Kobara, Yoshihito Nakato, Takuji Kuroda, Ken Ishihara Securing SSL-VPN with LR-AKE to Access Personal Health Record. Search on Bibsonomy MedInfo The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Stefan Zickler, Tim Laue 0001, José Angelo Gurzoni Jr., Oliver Birbach, Joydeep Biswas, Manuela M. Veloso Five Years of SSL-Vision - Impact and Development. Search on Bibsonomy RoboCup The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Christopher Meyer, Jörg Schwenk SoK: Lessons Learned from SSL/TLS Attacks. Search on Bibsonomy WISA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Jeremy Clark, Paul C. van Oorschot SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17George Markowsky Was the 2006 Debian SSL Debacle a system accident? Search on Bibsonomy IDAACS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17B. Amann 0001, Robin Sommer, Matthias Vallentin, Seth Hall No attack necessary: the surprising dynamics of SSL trust relationships. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Mishari Al Mishari, Emiliano De Cristofaro, Karim M. El Defrawy, Gene Tsudik Harvesting SSL Certificate Data to Identify Web-Fraud. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2012 DBLP  BibTeX  RDF
17Takamichi Saito, Kiyomi Sekiguchi, Ryosuke Hatsugai Authentication Binding between SSL/TLS and HTTP. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Fenil Kavathia, Ajay Modi SSL Enhancement Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
17Wassim El-Hajj The most recent SSL security attacks: origins, implementation, evaluation, and suggested countermeasures. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Martin Georgiev, Subodh Iyengar, Suman Jana, Rishita Anubhai, Dan Boneh, Vitaly Shmatikov The most dangerous code in the world: validating SSL certificates in non-browser software. Search on Bibsonomy CCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith 0001, Lars Baumgärtner, Bernd Freisleben Why eve and mallory love android: an analysis of android SSL (in)security. Search on Bibsonomy CCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Sophia G. Petridou, Stylianos Basagiannis Towards energy consumption evaluation of the SSL handshake protocol in mobile communications. Search on Bibsonomy WONS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Keunyoung Park, Yong-Soo Kim, Juho Kim Selective Application of VPN by Service Using Port Number in SSL-Based Host-to-Gateway VPN Environment. Search on Bibsonomy ICHIT (1) The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Peipei Fu, Li Guo, Gang Xiong, Jiao Meng Classification Research on SSL Encrypted Application. Search on Bibsonomy ISCTCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Somnuk Puangpronpitag, Nattavut Sriwiboon Simple and Lightweight HTTPS Enforcement to Protect against SSL Striping Attack. Search on Bibsonomy CICSyN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road? Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Pascal Urien, Christophe Kiennert A new keying system for RFID lock based on SSL dual interface NFC chips and android mobiles. Search on Bibsonomy CCNC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Yuji Suga Countermeasures and Tactics for Transitioning against the SSL/TLS Renegotiation Vulnerability. Search on Bibsonomy IMIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Italo Dacosta, Mustaque Ahamad, Patrick Traynor Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Georg Carle X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Olivier Levillain, Arnaud Ébalard, Benjamin Morin, Hervé Debar One year of SSL internet measurement. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Yuji Suga SSL/TLS Status Survey in Japan - Transitioning against the Renegotiation Vulnerability and Short RSA Key Length Problem. Search on Bibsonomy AsiaJCIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17 SSL. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Clemens Heinrich Secure Socket Layer (SSL). Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Chris Hare Secure Socket Layer (SSL). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon, KyoungSoo Park Accelerating SSL with GPUs. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Sean Turner, Tim Polk Prohibiting Secure Sockets Layer (SSL) Version 2.0. Search on Bibsonomy RFC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Alan O. Freier, Philip Karlton, Paul C. Kocher The Secure Sockets Layer (SSL) Protocol Version 3.0. Search on Bibsonomy RFC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Fang Qi, Zhe Tang, Guojun Wang 0001, Jie Wu 0001 SSL-enabled trusted communication: Spoofing and protecting the non-cautious users. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Ki-Woong Park, Kyu Ho Park ACCENT: Cognitive cryptography plugged compression for SSL/TLS-based cloud computing services. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Zhenzhong Wang, Yao Wang An improvement SSL protocol application research. Search on Bibsonomy EMEIT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Christopher Soghoian, Sid Stamm Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper). Search on Bibsonomy Financial Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Rachel Sparks, Anant Madabhushi Out-of-sample extrapolation using semi-supervised manifold learning (OSE-SSL): Content-based image retrieval for prostate histology grading. Search on Bibsonomy ISBI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Hyun-mi Jung, Kyung-su Han, Gang-soo Lee A SSL VPN Design Method for Enterprise FMC Security System Development. Search on Bibsonomy ICHIT (2) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Pascal Urien, Marc Pasquet, Christophe Kiennert A breakthrough for prepaid payment: End to end token exchange and management using secure SSL channels created by EAP-TLS smart cards. Search on Bibsonomy CTS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Feiyan Mu, Jiafen Zhang, Jing Du, Jie Lin Application of the Secure Transport SSL Protocol in Network Communication. Search on Bibsonomy ISCID (1) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Hamid R. Zarghi, Mohammad Sharifkhani, Iman Gholampour Implementation of a cost efficient SSL based on an Angular beamformer SRP-PHAT. Search on Bibsonomy ICECS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Taro Inagaki, Akeru Ishikawa, Kazuhito Murakami, Tadashi Naruse Robust Algorithm for Safety Region Computation and Its Application to Defense Strategy for RoboCup SSL. Search on Bibsonomy RoboCup The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Suresh V. Limkar, Rakesh Kumar Jha, Shilpa Pimpalkar, Santosh Darade Geo-Encryption - A New Direction to Secure Traditional SSL VPN. Search on Bibsonomy ITNG The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Mehrdad Kianersi, Mahmoud Gardeshi, Hamed Yousefi Security Analysis of Ultra-lightweight Protocol for Low-Cost RFID Tags: SSL-MAP. Search on Bibsonomy WiMo/CoNeCo The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon, KyoungSoo Park SSLShader: Cheap SSL Acceleration with Commodity Processors. Search on Bibsonomy NSDI The full citation details ... 2011 DBLP  BibTeX  RDF
17Chunhua Chen 0002, Chris J. Mitchell, Shaohua Tang SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Pascal Urien Convergent identity: Seamless OPENID services for 3G dongles using SSL enabled USIM smart cards. Search on Bibsonomy CCNC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Andreas Sotirakopoulos, Kirstie Hawkey, Konstantin Beznosov On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings. Search on Bibsonomy SOUPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Norman Lim, Shikharesh Majumdar, Vineet Srivastava 0002 Engineering SSL-based systems for enhancing system performance. Search on Bibsonomy ICPE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Kevin Benton, Ju-Yeon Jo, Yoohwan Kim SignatureCheck: a protocol to detect man-in-the-middle attack in SSL. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Max-Emanuel Maurer, Alexander De Luca, Tobias Stockinger Shining Chrome: Using Web Browser Personas to Enhance SSL Certificate Visualization. Search on Bibsonomy INTERACT (4) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Curtis McCarthy, Nur Zincir-Heywood An investigation on identifying SSL traffic. Search on Bibsonomy CISDA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Ralph Holz, Lothar Braun, Nils Kammenhuber, Georg Carle The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Haixin Wang, Guoqiang Bai 0001, Hongyi Chen A Gbps IPSec SSL Security Processor Design and Implementation in an FPGA Prototyping Platform. Search on Bibsonomy J. Signal Process. Syst. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Omar Al-Amir, Sufian Yousef, Samir Al-Khayatt Analysis and enhancement of SSL based UMTS authentication protocol. Search on Bibsonomy CSNDSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Takashi Isobe, Satoshi Tsutsumi, Koichiro Seto, Kenji Aoshima, Kazutoshi Kariya 10 Gbps implementation of TLS/SSL accelerator on FPGA. Search on Bibsonomy IWQoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Tadashi Naruse, Yasuhiro Masutani, Noriaki Mitsunaga, Yasunori Nagasaka, Takashi Fujii, Masato Watanabe, Yukiko Nakagawa, Osamu Naito SSL-Humanoid - RoboCup Soccer Using Humanoid Robots under the Global Vision. Search on Bibsonomy RoboCup The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Xiaozhu Kang, Michael E. Kounavis, David Durham System-wide anatomy and tuning of a SPECweb SSL server. Search on Bibsonomy ISCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Pascal Urien An OpenID Provider Based on SSL Smart Cards. Search on Bibsonomy CCNC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Nick Nikiforakis, Yves Younan, Wouter Joosen HProxy: Client-Side Detection of SSL Stripping Attacks. Search on Bibsonomy DIMVA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Marc Fischlin, Anja Lehmann, Daniel Wagner Hash Function Combiners in TLS and SSL. Search on Bibsonomy CT-RSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Johann Großschädl, Ilya Kizhvatov Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Yu-Ping Ding, Walid Rjaibi DB2 security features: audit facility and SSL. Search on Bibsonomy CASCON The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 706 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license