The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for SSL with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1997 (17) 1998-2000 (22) 2001 (16) 2002 (23) 2003 (24) 2004 (33) 2005 (50) 2006 (51) 2007 (44) 2008 (45) 2009 (30) 2010 (18) 2011 (27) 2012 (17) 2013 (17) 2014 (22) 2015 (23) 2016 (21) 2017 (17) 2018 (30) 2019 (29) 2020-2021 (39) 2022 (30) 2023 (46) 2024 (15)
Publication types (Num. hits)
article(198) incollection(5) inproceedings(500) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 510 occurrences of 301 keywords

Results
Found 706 publication records. Showing 706 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Rajesh Kumar Pateriya, J. L. Rana, S. C. Shrivastava, Jaideep Patel A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
17Mishari Al Mishari, Emiliano De Cristofaro, Karim M. El Defrawy, Gene Tsudik Harvesting SSL Certificate Data to Mitigate Web-Fraud Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
17Satoshi Shimazaki, Takamichi Saito SSL Connection Failover in Web Clusters and its Evaluation. Search on Bibsonomy NBiS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Robert Biddle, Paul C. van Oorschot, Andrew S. Patrick, Jennifer Sobey, Tara Whalen Browser interfaces and extended validation SSL certificates: an empirical study. Search on Bibsonomy CCSW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Pascal Urien Collaboration of SSL smart cards within the WEB2 landscape. Search on Bibsonomy CTS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, Lorrie Faith Cranor Crying Wolf: An Empirical Study of SSL Warning Effectiveness. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2009 DBLP  BibTeX  RDF
17Fang Qi, Zhe Tang, Guojun Wang 0001, Jie Wu 0001 QoS-aware Optimization Strategy for Security Ranking in SSL Protocol. Search on Bibsonomy MASS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Stefan Zickler, Tim Laue 0001, Oliver Birbach, Mahisorn Wongphati, Manuela M. Veloso SSL-Vision: The Shared Vision System for the RoboCup Small Size League. Search on Bibsonomy RoboCup The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Huawei Zhao, Ruixia Liu A Scheme to Improve Security of SSL. Search on Bibsonomy PACCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Wooyoung Jung, Sungmin Hong, Minkeun Ha, Young-Joo Kim, Daeyoung Kim 0001 SSL-Based Lightweight Security of IP-Based Wireless Sensor Networks. Search on Bibsonomy AINA Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Manuel Koschuch, Johann Großschädl, Dan Page, Philipp Grabher, Matthias Hudler, Michael Krüger Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems. Search on Bibsonomy ICICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Timo Pykalainen Adaption of Linux SSL Servers Across Cultures. Search on Bibsonomy First Monday The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Rolf Oppliger, Ralf Hauser, David A. Basin SSL/TLS session-aware user authentication revisited. Search on Bibsonomy Comput. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Meng-Da Wu, Stephen D. Wolthusen Network Forensics of Partial SSL/TLS Encrypted Traffic Classification Using Clustering Algorithms. Search on Bibsonomy IMF The full citation details ... 2008 DBLP  BibTeX  RDF
17Tibor Jager, Heiko Jäkel, Jörg Schwenk Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS. Search on Bibsonomy Sicherheit The full citation details ... 2008 DBLP  BibTeX  RDF
17Chris Hare Understanding SSL. Search on Bibsonomy Information Security Management Handbook, 6th ed. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Daniel F. García, Rodrigo García Acevedo, Joaquín Entrialgo, Javier García 0002, Manuel García Evaluation of the effect of SSL overhead in the performance of e-business servers operating in B2B scenarios. Search on Bibsonomy Comput. Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Neil Costigan, Michael Scott Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
17Sebastian Gajek, Lijun Liao, Bodo Möller, Jörg Schwenk SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services. Search on Bibsonomy WEWST The full citation details ... 2007 DBLP  BibTeX  RDF
17Sebastian Gajek, Lijun Liao, Bodo Möller, Jörg Schwenk SSL-over-SOAP: Towards a Token-based Key Establishment framework for Web services. Search on Bibsonomy WEWST@ECOWS (Final Proceedings) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Roberto Esposito, Daniele Paolo Radicioni CarpeDiem: an algorithm for the fast evaluation of SSL classifiers. Search on Bibsonomy ICML The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Rolf Oppliger, Ralf Hauser, David A. Basin SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle. Search on Bibsonomy Comput. Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Yong Song, Konstantin Beznosov, Victor C. M. Leung Multiple-Channel Security Architecture and its Implementation over SSL. Search on Bibsonomy EURASIP J. Wirel. Commun. Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Gregory V. Bard A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
17Ashraf Elgohary, Tarek S. Sobh, Mohammed Zaki 0001 Design of an enhancement for SSL/TLS protocols. Search on Bibsonomy Comput. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Matjaz B. Juric, Ivan Rozman, Bostjan Brumen, Matjaz Colnaric, Marjan Hericko Comparison of performance of Web services, WS-Security, RMI, and RMI-SSL. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Ahmed Serhrouchni, Ibrahim Hajjeh Intégrationfr de la signature numérique au protocole SSL/TLS. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Asad M. Ali Designing SSL/TLS protocol for resource constrained devices. Search on Bibsonomy Communication, Network, and Information Security The full citation details ... 2006 DBLP  BibTeX  RDF
17Gregory V. Bard A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL. Search on Bibsonomy SECRYPT The full citation details ... 2006 DBLP  BibTeX  RDF
17Jingli Zhou, Hongtao Xia, Xiaofeng Wang, Jifeng Yu A New VPN Solution Based on Asymmetrical SSL Tunnels. Search on Bibsonomy FCST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Sebastian Gajek, Jörg Schwenk, Christoph Wegener SSL-VA-Authentifizierung als Schutz von Phishing und Pharming. Search on Bibsonomy Sicherheit The full citation details ... 2006 DBLP  BibTeX  RDF
17Clemens Heinrich Secure Socket Layer (SSL). Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Chris Lesniewski-Laas, M. Frans Kaashoek SSL splitting: Securely serving data from untrusted caches. Search on Bibsonomy Comput. Networks The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Claude Castelluccia, Einar Mykletun, Gene Tsudik Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
17John Marchesini, Sean W. Smith, Meiyuan Zhao Keyjacking: the surprising insecurity of client-side SSL. Search on Bibsonomy Comput. Secur. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç Improving Brumley and Boneh timing attack on unprotected SSL implementations. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA, timing attacks, side-channel cryptanalysis
17Li Zhao 0002, Ravi R. Iyer 0001, Srihari Makineni, Laxmi N. Bhuyan Anatomy and Performance of SSL Processing. Search on Bibsonomy ISPASS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Diana Berbecaru On Measuring SSL-based Secure Data Transfer with Handheld Devices. Search on Bibsonomy ISWCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Shobhana Subramanian, Jeyaram Krishnasamy Multiprocessor scaling characterization of SSL processing in web server applications. Search on Bibsonomy PDPTA The full citation details ... 2005 DBLP  BibTeX  RDF
17Jun Li 0001, Xun Kang mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Yuqing Zhang, Xiuying Liu, Bo Yang Running-mode Analysis of the SSL Protocol. Search on Bibsonomy International Conference on Internet Computing The full citation details ... 2005 DBLP  BibTeX  RDF
17Jens Mache, Tim Likarish Performance Evaluation of Browser-based SSL VPN Gateways. Search on Bibsonomy International Conference on Internet Computing The full citation details ... 2005 DBLP  BibTeX  RDF
17Euiseok Nahm, Byungjo Min, Jin Bae Park, Hagbae Kim Software Implementation of a Secure Socket Layer (SSL) Accelerator Based on Kernel Thread. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2004 DBLP  BibTeX  RDF
17Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Gunter Dueck Der Mensch in artgerechter Haltung - SSL. Search on Bibsonomy Inform. Spektrum The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Gregory V. Bard The Vulnerability of SSL to Chosen Plaintext Attack. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
17AbdelNasir Alshamsi, Takamichi Saito A Technical Comparison of IPSec and SSL. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
17Ghassan Kbar Improved SSL application using session key based double key encryption/decryption (SDKED). Search on Bibsonomy Parallel and Distributed Computing and Networks The full citation details ... 2004 DBLP  BibTeX  RDF
17Yong Song, Victor C. M. Leung, Konstantin Beznosov Supporting End-to-end Security across Proxies with Multiple-Channel SSL. Search on Bibsonomy SEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Mohamad Badra, Pascal Urien Toward SSL integration in SIM SmartCards. Search on Bibsonomy WCNC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Yong Song, Victor C. M. Leung, Konstantin Beznosov Implementing Multiple Channels over SSL. Search on Bibsonomy ICETE (2) The full citation details ... 2004 DBLP  BibTeX  RDF
17Ibrahim Hajjeh, Ahmed Serhrouchni Integrating a Signature Module in SSL/TLS. Search on Bibsonomy ICETE (2) The full citation details ... 2004 DBLP  BibTeX  RDF
17Cai Longzheng, Shengsheng Yu, Jingli Zhou Research and Implementation of Remote Desktop Protocol Service Over SSL VPN. Search on Bibsonomy IEEE SCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Vlastimil Klíma, Ondrej Pokorný, Tomás Rosa Attacking RSA-based Sessions in SSL/TLS. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2003 DBLP  BibTeX  RDF
17Andrew Harding SSL Virtual Private Networks. Search on Bibsonomy Comput. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Chris Lesniewski-Laas, M. Frans Kaashoek SSL Splitting: Securely Serving Data from Untrusted Caches. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2003 DBLP  BibTeX  RDF
17Ibrahim Hajjeh, Ahmed Serhrouchni, Frédérique Tastet ISAKMP handshake for SSL/TLS. Search on Bibsonomy GLOBECOM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Ibrahim Hajjeh, Ahmed Serhrouchni, Frédérique Tastet New Key Management Protocol for SSL/TLS. Search on Bibsonomy Net-Con The full citation details ... 2003 DBLP  BibTeX  RDF
17Henning Mohren Automatische SSL-Zertifizierung. Search on Bibsonomy DFN-Arbeitstagung über Kommunikationsnetze The full citation details ... 2003 DBLP  BibTeX  RDF
17Sanjay Raja SSL Solutions and Performance Criteria. Search on Bibsonomy Int. CMG Conference The full citation details ... 2002 DBLP  BibTeX  RDF
17Eric Rescorla, Adam Cain, Brian Korver SSLACC: A Clustered SSL Accelerator. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2002 DBLP  BibTeX  RDF
17Hugo Krawczyk The order of encryption and authentication for protecting communications (Or: how secure is SSL?). Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2001 DBLP  BibTeX  RDF
17Michelle S. Wangham, Lau Cheuk Lung, Carla Merkle Westphall, Joni da Silva Fraga Integrating SSL to the JaCoWeb Security Framework: Project and Implementation. Search on Bibsonomy Integrated Network Management The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17George Apostolopoulos, Vinod G. J. Peris, Prashant Pradhan, Debanjan Saha Securing electronic commerce: reducing the SSL overhead. Search on Bibsonomy IEEE Netw. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Timothy G. Shoriak SSL/TLS Protocol Enablement for Key Recovery. Search on Bibsonomy Comput. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Jeremy T. Bradley The SSL Reference Implementation Project. Search on Bibsonomy 2000   RDF
17John C. Mitchell, Vitaly Shmatikov, Ulrich Stern Finite-State Analysis of SSL 3.0. Search on Bibsonomy USENIX Security Symposium The full citation details ... 1998 DBLP  BibTeX  RDF
17Mostafa Hashem Sherif, Ahmed Serhrouchni, A. Yassin Gaid, Farshid Farazmandnia SET and SSL: electronic payments on the Internet. Search on Bibsonomy ISCC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Frederick J. Hirsch Introducing SSL and certificates using SSLeay. Search on Bibsonomy World Wide Web J. The full citation details ... 1997 DBLP  BibTeX  RDF
17Sylvia Ballhausen Morphologische Untersuchungen zur Gestaltentwicklung der Schneidezahnanlagen der ersten Dentition im Oberkiefer: computergestützte 3-D-Rekonstruktionen anhand von Schnittserien menschlicher Embryonen von 21 - 47 mm SSL. Search on Bibsonomy 1995   RDF
17Bernd Gersdorf Transformation Development: Translators from TrafoLa to SSL and TrafoLa-H. Search on Bibsonomy PROSPECTRA Book The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
11R. Muley, M. Chatterjee High performance load balancing schemes for cluster based secure web server. Search on Bibsonomy ICWET The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
11Scott A. Crosby, Dan S. Wallach, Rudolf H. Riedi Opportunities and Limits of Remote Timing Attacks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF jitter, timing attacks, Information leakage
11Zhenyu Hu, Fuchun Sun 0001, JianChun Jiang Ciphertext verification security of symmetric encryption schemes. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF reaction attack, IND-CPA, IND-CCA, privacy, integrity, encryption
11Andreas Fuchs 0002, Sigrid Gürgens, Carsten Rudolph On the Security Validation of Integrated Security Solutions. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Jaroslaw Paduch, Jamie Levy, Bilal Khan Using a secure permutational covert channel to detect local and wide area interposition attacks. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ARP, interposition, protocols, covert channels, DNS
11Hongwei Li 0001, Yuanshun Dai, Ling Tian, Haomiao Yang Identity-Based Authentication for Cloud Computing. Search on Bibsonomy CloudCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, cloud computing, identity-based cryptography
11Masaru Takesue An HTTP Extension for Secure Transfer of Confidential Data. Search on Bibsonomy NAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Janet Light, O. K. Ikejiani An efficient wireless communication protocol for secured transmission of content-sensitive multimedia data. Search on Bibsonomy WOWMOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Mansoor Alicherry, Angelos D. Keromytis DoubleCheck: Multi-path verification against man-in-the-middle attacks. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, Stefan Savage When private keys are public: results from the 2008 Debian OpenSSL vulnerability. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF debian, openssl, entropy, survey, attacks, prng
11Luther Martin Key-Management Infrastructure for Protecting Stored Data. Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11David Ahmad Two Years of Broken Crypto: Debian's Dress Rehearsal for a Global PKI Compromise. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Elie Prudhomme, Stéphane Lallich Maps Ensemble for Semi-Supervised Learning of Large High Dimensional Datasets. Search on Bibsonomy ISMIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Frederic Stumpf, Claudia Eckert 0001, Shane Balfe Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure E-Commerce, Security, Virtualization, Trusted Computing, Attestation
11Cha Zhang, Dinei A. F. Florêncio, Zhengyou Zhang Why does PHAT work well in lownoise, reverberative environments? Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Rujie Liu, Yuehong Wang, Takayuki Baba, Daiki Masumoto Semi-supervised learning by locally linear embedding in kernel space. Search on Bibsonomy ICPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Chwan-Hwa John Wu, Tong Liu Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). Search on Bibsonomy SpringSim The full citation details ... 2008 DBLP  DOI  BibTeX  RDF computer network defense, authentication, network security, discrete event simulation, DDoS, intrusion
11Paul Rabinovich ECL: A TLS Extension for Authentication in Complex PKIs. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Koshi Asano, Kazuhito Murakami, Tadashi Naruse Detection of Basic Behaviors in Logged Data in RoboCup Small Size League. Search on Bibsonomy RoboCup The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Jimin Jia, Nenghai Yu, Xian-Sheng Hua 0001 Annotating personal albums via web mining. Search on Bibsonomy ACM Multimedia The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multi-graph, personal albums, semi-supervised learning, image annotation, similarity propagation
11Tobias Eggendorfer Application Level Proxies on Bridges. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Network, Proxy, Bridge, Content Filter
11Daniel Ramsbrock, Xinyuan Wang 0005, Xuxian Jiang A First Step towards Live Botmaster Traceback. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Sukanya Suwisuthikasem, Songsri Tangsripairoj E-Tax Invoice System Using Web Services Technology: A Case Study of the Revenue Department of Thailand. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Tax Invoice, Web Services
11Brett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin C. Almeroth, Christopher Kruegel VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Thomas Weigold, Thorsten Kramp, Reto Hermann, Frank Höring, Peter Buhler, Michael Baentsch The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Internet Banking, Authentication, Malicious Software, Secure Token, Man-in-the-middle
11Vittorio Cortellessa, Catia Trubiani Towards a library of composable models to estimate the performance of security solutions. Search on Bibsonomy WOSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tradeoff between performance and security, software security, model composition, generalized stochastic petri nets, software performance modeling
11Kenneth G. Paterson, Gaven J. Watson Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Jennifer Sobey, Robert Biddle, Paul C. van Oorschot, Andrew S. Patrick Exploring User Reactions to New Browser Cues for Extended Validation Certificates. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF extended validation certificates, user study, Usable security, browser security
11Yijun Yu, Jan Jürjens, John Mylopoulos Traceability for the maintenance of secure software. Search on Bibsonomy ICSM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 706 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license