Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Rajesh Kumar Pateriya, J. L. Rana, S. C. Shrivastava, Jaideep Patel |
A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption |
CoRR |
2009 |
DBLP BibTeX RDF |
|
17 | Mishari Al Mishari, Emiliano De Cristofaro, Karim M. El Defrawy, Gene Tsudik |
Harvesting SSL Certificate Data to Mitigate Web-Fraud |
CoRR |
2009 |
DBLP BibTeX RDF |
|
17 | Satoshi Shimazaki, Takamichi Saito |
SSL Connection Failover in Web Clusters and its Evaluation. |
NBiS |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Robert Biddle, Paul C. van Oorschot, Andrew S. Patrick, Jennifer Sobey, Tara Whalen |
Browser interfaces and extended validation SSL certificates: an empirical study. |
CCSW |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Pascal Urien |
Collaboration of SSL smart cards within the WEB2 landscape. |
CTS |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, Lorrie Faith Cranor |
Crying Wolf: An Empirical Study of SSL Warning Effectiveness. |
USENIX Security Symposium |
2009 |
DBLP BibTeX RDF |
|
17 | Fang Qi, Zhe Tang, Guojun Wang 0001, Jie Wu 0001 |
QoS-aware Optimization Strategy for Security Ranking in SSL Protocol. |
MASS |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Stefan Zickler, Tim Laue 0001, Oliver Birbach, Mahisorn Wongphati, Manuela M. Veloso |
SSL-Vision: The Shared Vision System for the RoboCup Small Size League. |
RoboCup |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Huawei Zhao, Ruixia Liu |
A Scheme to Improve Security of SSL. |
PACCS |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Wooyoung Jung, Sungmin Hong, Minkeun Ha, Young-Joo Kim, Daeyoung Kim 0001 |
SSL-Based Lightweight Security of IP-Based Wireless Sensor Networks. |
AINA Workshops |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Manuel Koschuch, Johann Großschädl, Dan Page, Philipp Grabher, Matthias Hudler, Michael Krüger |
Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems. |
ICICS |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Timo Pykalainen |
Adaption of Linux SSL Servers Across Cultures. |
First Monday |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Rolf Oppliger, Ralf Hauser, David A. Basin |
SSL/TLS session-aware user authentication revisited. |
Comput. Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Meng-Da Wu, Stephen D. Wolthusen |
Network Forensics of Partial SSL/TLS Encrypted Traffic Classification Using Clustering Algorithms. |
IMF |
2008 |
DBLP BibTeX RDF |
|
17 | Tibor Jager, Heiko Jäkel, Jörg Schwenk |
Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS. |
Sicherheit |
2008 |
DBLP BibTeX RDF |
|
17 | Chris Hare |
Understanding SSL. |
Information Security Management Handbook, 6th ed. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Daniel F. García, Rodrigo García Acevedo, Joaquín Entrialgo, Javier García 0002, Manuel García |
Evaluation of the effect of SSL overhead in the performance of e-business servers operating in B2B scenarios. |
Comput. Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Neil Costigan, Michael Scott |
Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3. |
IACR Cryptol. ePrint Arch. |
2007 |
DBLP BibTeX RDF |
|
17 | Sebastian Gajek, Lijun Liao, Bodo Möller, Jörg Schwenk |
SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services. |
WEWST |
2007 |
DBLP BibTeX RDF |
|
17 | Sebastian Gajek, Lijun Liao, Bodo Möller, Jörg Schwenk |
SSL-over-SOAP: Towards a Token-based Key Establishment framework for Web services. |
WEWST@ECOWS (Final Proceedings) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Roberto Esposito, Daniele Paolo Radicioni |
CarpeDiem: an algorithm for the fast evaluation of SSL classifiers. |
ICML |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Rolf Oppliger, Ralf Hauser, David A. Basin |
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle. |
Comput. Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Yong Song, Konstantin Beznosov, Victor C. M. Leung |
Multiple-Channel Security Architecture and its Implementation over SSL. |
EURASIP J. Wirel. Commun. Netw. |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Gregory V. Bard |
A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
17 | Ashraf Elgohary, Tarek S. Sobh, Mohammed Zaki 0001 |
Design of an enhancement for SSL/TLS protocols. |
Comput. Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Matjaz B. Juric, Ivan Rozman, Bostjan Brumen, Matjaz Colnaric, Marjan Hericko |
Comparison of performance of Web services, WS-Security, RMI, and RMI-SSL. |
J. Syst. Softw. |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Ahmed Serhrouchni, Ibrahim Hajjeh |
Intégrationfr de la signature numérique au protocole SSL/TLS. |
Ann. des Télécommunications |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Asad M. Ali |
Designing SSL/TLS protocol for resource constrained devices. |
Communication, Network, and Information Security |
2006 |
DBLP BibTeX RDF |
|
17 | Gregory V. Bard |
A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL. |
SECRYPT |
2006 |
DBLP BibTeX RDF |
|
17 | Jingli Zhou, Hongtao Xia, Xiaofeng Wang, Jifeng Yu |
A New VPN Solution Based on Asymmetrical SSL Tunnels. |
FCST |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Sebastian Gajek, Jörg Schwenk, Christoph Wegener |
SSL-VA-Authentifizierung als Schutz von Phishing und Pharming. |
Sicherheit |
2006 |
DBLP BibTeX RDF |
|
17 | Clemens Heinrich |
Secure Socket Layer (SSL). |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Chris Lesniewski-Laas, M. Frans Kaashoek |
SSL splitting: Securely serving data from untrusted caches. |
Comput. Networks |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Claude Castelluccia, Einar Mykletun, Gene Tsudik |
Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
17 | John Marchesini, Sean W. Smith, Meiyuan Zhao |
Keyjacking: the surprising insecurity of client-side SSL. |
Comput. Secur. |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç |
Improving Brumley and Boneh timing attack on unprotected SSL implementations. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
RSA, timing attacks, side-channel cryptanalysis |
17 | Li Zhao 0002, Ravi R. Iyer 0001, Srihari Makineni, Laxmi N. Bhuyan |
Anatomy and Performance of SSL Processing. |
ISPASS |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Diana Berbecaru |
On Measuring SSL-based Secure Data Transfer with Handheld Devices. |
ISWCS |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Shobhana Subramanian, Jeyaram Krishnasamy |
Multiprocessor scaling characterization of SSL processing in web server applications. |
PDPTA |
2005 |
DBLP BibTeX RDF |
|
17 | Jun Li 0001, Xun Kang |
mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Yuqing Zhang, Xiuying Liu, Bo Yang |
Running-mode Analysis of the SSL Protocol. |
International Conference on Internet Computing |
2005 |
DBLP BibTeX RDF |
|
17 | Jens Mache, Tim Likarish |
Performance Evaluation of Browser-based SSL VPN Gateways. |
International Conference on Internet Computing |
2005 |
DBLP BibTeX RDF |
|
17 | Euiseok Nahm, Byungjo Min, Jin Bae Park, Hagbae Kim |
Software Implementation of a Secure Socket Layer (SSL) Accelerator Based on Kernel Thread. |
IEICE Trans. Inf. Syst. |
2004 |
DBLP BibTeX RDF |
|
17 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis |
Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks. |
Wirel. Pers. Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Gunter Dueck |
Der Mensch in artgerechter Haltung - SSL. |
Inform. Spektrum |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Gregory V. Bard |
The Vulnerability of SSL to Chosen Plaintext Attack. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
17 | AbdelNasir Alshamsi, Takamichi Saito |
A Technical Comparison of IPSec and SSL. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
17 | Ghassan Kbar |
Improved SSL application using session key based double key encryption/decryption (SDKED). |
Parallel and Distributed Computing and Networks |
2004 |
DBLP BibTeX RDF |
|
17 | Yong Song, Victor C. M. Leung, Konstantin Beznosov |
Supporting End-to-end Security across Proxies with Multiple-Channel SSL. |
SEC |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Mohamad Badra, Pascal Urien |
Toward SSL integration in SIM SmartCards. |
WCNC |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Yong Song, Victor C. M. Leung, Konstantin Beznosov |
Implementing Multiple Channels over SSL. |
ICETE (2) |
2004 |
DBLP BibTeX RDF |
|
17 | Ibrahim Hajjeh, Ahmed Serhrouchni |
Integrating a Signature Module in SSL/TLS. |
ICETE (2) |
2004 |
DBLP BibTeX RDF |
|
17 | Cai Longzheng, Shengsheng Yu, Jingli Zhou |
Research and Implementation of Remote Desktop Protocol Service Over SSL VPN. |
IEEE SCC |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Vlastimil Klíma, Ondrej Pokorný, Tomás Rosa |
Attacking RSA-based Sessions in SSL/TLS. |
IACR Cryptol. ePrint Arch. |
2003 |
DBLP BibTeX RDF |
|
17 | Andrew Harding |
SSL Virtual Private Networks. |
Comput. Secur. |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Chris Lesniewski-Laas, M. Frans Kaashoek |
SSL Splitting: Securely Serving Data from Untrusted Caches. |
USENIX Security Symposium |
2003 |
DBLP BibTeX RDF |
|
17 | Ibrahim Hajjeh, Ahmed Serhrouchni, Frédérique Tastet |
ISAKMP handshake for SSL/TLS. |
GLOBECOM |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Ibrahim Hajjeh, Ahmed Serhrouchni, Frédérique Tastet |
New Key Management Protocol for SSL/TLS. |
Net-Con |
2003 |
DBLP BibTeX RDF |
|
17 | Henning Mohren |
Automatische SSL-Zertifizierung. |
DFN-Arbeitstagung über Kommunikationsnetze |
2003 |
DBLP BibTeX RDF |
|
17 | Sanjay Raja |
SSL Solutions and Performance Criteria. |
Int. CMG Conference |
2002 |
DBLP BibTeX RDF |
|
17 | Eric Rescorla, Adam Cain, Brian Korver |
SSLACC: A Clustered SSL Accelerator. |
USENIX Security Symposium |
2002 |
DBLP BibTeX RDF |
|
17 | Hugo Krawczyk |
The order of encryption and authentication for protecting communications (Or: how secure is SSL?). |
IACR Cryptol. ePrint Arch. |
2001 |
DBLP BibTeX RDF |
|
17 | Michelle S. Wangham, Lau Cheuk Lung, Carla Merkle Westphall, Joni da Silva Fraga |
Integrating SSL to the JaCoWeb Security Framework: Project and Implementation. |
Integrated Network Management |
2001 |
DBLP DOI BibTeX RDF |
|
17 | George Apostolopoulos, Vinod G. J. Peris, Prashant Pradhan, Debanjan Saha |
Securing electronic commerce: reducing the SSL overhead. |
IEEE Netw. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Timothy G. Shoriak |
SSL/TLS Protocol Enablement for Key Recovery. |
Comput. Secur. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Jeremy T. Bradley |
The SSL Reference Implementation Project. |
|
2000 |
RDF |
|
17 | John C. Mitchell, Vitaly Shmatikov, Ulrich Stern |
Finite-State Analysis of SSL 3.0. |
USENIX Security Symposium |
1998 |
DBLP BibTeX RDF |
|
17 | Mostafa Hashem Sherif, Ahmed Serhrouchni, A. Yassin Gaid, Farshid Farazmandnia |
SET and SSL: electronic payments on the Internet. |
ISCC |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Frederick J. Hirsch |
Introducing SSL and certificates using SSLeay. |
World Wide Web J. |
1997 |
DBLP BibTeX RDF |
|
17 | Sylvia Ballhausen |
Morphologische Untersuchungen zur Gestaltentwicklung der Schneidezahnanlagen der ersten Dentition im Oberkiefer: computergestützte 3-D-Rekonstruktionen anhand von Schnittserien menschlicher Embryonen von 21 - 47 mm SSL. |
|
1995 |
RDF |
|
17 | Bernd Gersdorf |
Transformation Development: Translators from TrafoLa to SSL and TrafoLa-H. |
PROSPECTRA Book |
1993 |
DBLP DOI BibTeX RDF |
|
11 | R. Muley, M. Chatterjee |
High performance load balancing schemes for cluster based secure web server. |
ICWET |
2010 |
DBLP DOI BibTeX RDF |
|
11 | Scott A. Crosby, Dan S. Wallach, Rudolf H. Riedi |
Opportunities and Limits of Remote Timing Attacks. |
ACM Trans. Inf. Syst. Secur. |
2009 |
DBLP DOI BibTeX RDF |
jitter, timing attacks, Information leakage |
11 | Zhenyu Hu, Fuchun Sun 0001, JianChun Jiang |
Ciphertext verification security of symmetric encryption schemes. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
reaction attack, IND-CPA, IND-CCA, privacy, integrity, encryption |
11 | Andreas Fuchs 0002, Sigrid Gürgens, Carsten Rudolph |
On the Security Validation of Integrated Security Solutions. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Jaroslaw Paduch, Jamie Levy, Bilal Khan |
Using a secure permutational covert channel to detect local and wide area interposition attacks. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
ARP, interposition, protocols, covert channels, DNS |
11 | Hongwei Li 0001, Yuanshun Dai, Ling Tian, Haomiao Yang |
Identity-Based Authentication for Cloud Computing. |
CloudCom |
2009 |
DBLP DOI BibTeX RDF |
authentication, cloud computing, identity-based cryptography |
11 | Masaru Takesue |
An HTTP Extension for Secure Transfer of Confidential Data. |
NAS |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Janet Light, O. K. Ikejiani |
An efficient wireless communication protocol for secured transmission of content-sensitive multimedia data. |
WOWMOM |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Mansoor Alicherry, Angelos D. Keromytis |
DoubleCheck: Multi-path verification against man-in-the-middle attacks. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, Stefan Savage |
When private keys are public: results from the 2008 Debian OpenSSL vulnerability. |
Internet Measurement Conference |
2009 |
DBLP DOI BibTeX RDF |
debian, openssl, entropy, survey, attacks, prng |
11 | Luther Martin |
Key-Management Infrastructure for Protecting Stored Data. |
Computer |
2008 |
DBLP DOI BibTeX RDF |
|
11 | David Ahmad |
Two Years of Broken Crypto: Debian's Dress Rehearsal for a Global PKI Compromise. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Elie Prudhomme, Stéphane Lallich |
Maps Ensemble for Semi-Supervised Learning of Large High Dimensional Datasets. |
ISMIS |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Frederic Stumpf, Claudia Eckert 0001, Shane Balfe |
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Secure E-Commerce, Security, Virtualization, Trusted Computing, Attestation |
11 | Cha Zhang, Dinei A. F. Florêncio, Zhengyou Zhang |
Why does PHAT work well in lownoise, reverberative environments? |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Rujie Liu, Yuehong Wang, Takayuki Baba, Daiki Masumoto |
Semi-supervised learning by locally linear embedding in kernel space. |
ICPR |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Chwan-Hwa John Wu, Tong Liu |
Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). |
SpringSim |
2008 |
DBLP DOI BibTeX RDF |
computer network defense, authentication, network security, discrete event simulation, DDoS, intrusion |
11 | Paul Rabinovich |
ECL: A TLS Extension for Authentication in Complex PKIs. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Koshi Asano, Kazuhito Murakami, Tadashi Naruse |
Detection of Basic Behaviors in Logged Data in RoboCup Small Size League. |
RoboCup |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Jimin Jia, Nenghai Yu, Xian-Sheng Hua 0001 |
Annotating personal albums via web mining. |
ACM Multimedia |
2008 |
DBLP DOI BibTeX RDF |
multi-graph, personal albums, semi-supervised learning, image annotation, similarity propagation |
11 | Tobias Eggendorfer |
Application Level Proxies on Bridges. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
Security, Network, Proxy, Bridge, Content Filter |
11 | Daniel Ramsbrock, Xinyuan Wang 0005, Xuxian Jiang |
A First Step towards Live Botmaster Traceback. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Sukanya Suwisuthikasem, Songsri Tangsripairoj |
E-Tax Invoice System Using Web Services Technology: A Case Study of the Revenue Department of Thailand. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
Tax Invoice, Web Services |
11 | Brett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin C. Almeroth, Christopher Kruegel |
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Thomas Weigold, Thorsten Kramp, Reto Hermann, Frank Höring, Peter Buhler, Michael Baentsch |
The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
Secure Internet Banking, Authentication, Malicious Software, Secure Token, Man-in-the-middle |
11 | Vittorio Cortellessa, Catia Trubiani |
Towards a library of composable models to estimate the performance of security solutions. |
WOSP |
2008 |
DBLP DOI BibTeX RDF |
tradeoff between performance and security, software security, model composition, generalized stochastic petri nets, software performance modeling |
11 | Kenneth G. Paterson, Gaven J. Watson |
Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Jennifer Sobey, Robert Biddle, Paul C. van Oorschot, Andrew S. Patrick |
Exploring User Reactions to New Browser Cues for Extended Validation Certificates. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
extended validation certificates, user study, Usable security, browser security |
11 | Yijun Yu, Jan Jürjens, John Mylopoulos |
Traceability for the maintenance of secure software. |
ICSM |
2008 |
DBLP DOI BibTeX RDF |
|