|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 510 occurrences of 301 keywords
|
|
|
Results
Found 706 publication records. Showing 706 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
117 | Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwon Baik |
Design and Implementation of an SSL Component Based on CBD. |
AsiaSim |
2004 |
DBLP DOI BibTeX RDF |
|
115 | Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon, KyoungSoo Park |
Accelerating SSL with GPUs. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
GPU, CUDA, SSL |
100 | Jordi Guitart, David Carrera 0001, Vicenç Beltran 0001, Jordi Torres, Eduard Ayguadé |
Session-Based Adaptive Overload Control for Secure Dynamic Web Applications. |
ICPP |
2005 |
DBLP DOI BibTeX RDF |
|
95 | Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrère, Abdelmalek Benzekri |
Which Web Browsers Process SSL Certificates in a Standardized Way? |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
95 | Ryosuke Hatsugai, Takamichi Saito |
Load-Balancing SSL Cluster Using Session Migration. |
AINA |
2007 |
DBLP DOI BibTeX RDF |
|
95 | Ronald Mraz |
Secure Blue: An Architecture for a Scalable, Reliable, High Volume SSL Internet Server. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
91 | Diana Berbecaru, Antonio Lioy |
On the Robustness of Applications Based on the SSL and TLS Security Protocols. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
MITM attack, security, SSL/TLS, truncation attack |
84 | Jingli Zhou, Hongtao Xia, Jifeng Yu, Xiaofeng Wang |
Asymmetrical SSL Tunnel Based VPN. |
ISPA |
2006 |
DBLP DOI BibTeX RDF |
|
84 | André Adelsbach, Sebastian Gajek, Jörg Schwenk |
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
84 | Hovav Shacham, Dan Boneh |
Improving SSL Handshake Performance via Batching. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
81 | Homin K. Lee, Tal Malkin, Erich M. Nahum |
Cryptographic strength of ssl/tls servers: current and recent practices. |
Internet Measurement Conference |
2007 |
DBLP DOI BibTeX RDF |
network security, servers, ssl |
77 | Yasunori Nagasaka, Tatsumasa Kitahara, Tomoichi Takahashi |
A Proposal of Bridging Activities between RoboCupJunior and Senior Leagues. |
RoboCup |
2008 |
DBLP DOI BibTeX RDF |
|
77 | Krishna Kant 0001, Ravishankar K. Iyer, Prasant Mohapatra |
Architectural Impact of Secure Socket Layer on Internet Servers. |
ICCD |
2000 |
DBLP DOI BibTeX RDF |
|
73 | Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger |
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Performance Evaluation, Network Security, Elliptic Curve Cryptography, Side-Channel Analysis, Efficient Implementation |
73 | Larry D. Bisel |
The Role of SSL in Cybersecutiry. |
IT Prof. |
2007 |
DBLP DOI BibTeX RDF |
|
73 | Xiaodong Lin 0001, Johnny W. Wong, Weidong Kou |
Performance Analysis of Secure Web Server Based on SSL. |
ISW |
2000 |
DBLP DOI BibTeX RDF |
|
69 | Adonis P. H. Fung, K. W. Cheung 0003 |
SSLock: sustaining the trust on entities brought by SSL. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
SSL trust management, domain naming convention, man-in-the-middle attacks |
66 | Kazimierz Subieta |
Semantics of Query Languages for Network Databases. |
ACM Trans. Database Syst. |
1985 |
DBLP DOI BibTeX RDF |
|
64 | Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols. |
IEEE Trans. Mob. Comput. |
2006 |
DBLP DOI BibTeX RDF |
energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES |
64 | Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
Analyzing the energy consumption of security protocols. |
ISLPED |
2003 |
DBLP DOI BibTeX RDF |
energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES |
62 | Fang Qi, Zhe Tang, Guojun Wang 0001 |
Attacks vs. Countermeasures of SSL Protected Trust Model. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Jin-Ha Kim, Gyu Sang Choi, Chita R. Das |
An SSL Back-End Forwarding Scheme in Cluster-Based Web Servers. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
application server layer, cluster, Web servers, load distribution, user-level communication, Secure Sockets Layer |
62 | Claude Castelluccia, Einar Mykletun, Gene Tsudik |
Improving secure server performance by re-balancing SSL/TLS handshakes. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
server-aided RSA, server-aided secure computation, load-balancing, denial-of-service, hardware accelerators, client puzzles |
62 | Fang Qi, Weijia Jia 0001, Feng Bao 0001, Yongdong Wu |
Batching SSL/TLS Handshake Improved. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Nau Okamoto, Shigetomo Kimura, Yoshihiko Ebihara |
An Introduction of Compression Algorithms into SSL/TLS and Proposal of Compression Algorithms Specialized for Application. |
AINA |
2003 |
DBLP DOI BibTeX RDF |
|
55 | Jinhui Tang 0001, Xian-Sheng Hua 0001, Guo-Jun Qi, Tao Mei 0001, Xiuqing Wu |
Anisotropic Manifold Ranking for Video Annotation. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Kevin J. Ma, Radim Bartos |
Analysis of Transport Optimization Techniques. |
ICWS |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Xuehai Bian, Gregory D. Abowd, James M. Rehg |
Using Sound Source Localization in a Home Environment. |
Pervasive |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Vorapranee Khu-smith, Chris J. Mitchell |
Using GSM to enhance e-commerce security. |
Workshop Mobile Commerce |
2002 |
DBLP DOI BibTeX RDF |
GSM security, mobile or Internet payment protocol, E-commerce security |
53 | Byung kwan Lee, Tai-Chi Lee, Seung Hae Yang |
HESSL (Highly Enhanced Security Socket Layer) Protocol. |
CEC |
2005 |
DBLP DOI BibTeX RDF |
HESSL, F_{2^m } ECC, F_{2^m } HECC, BSB, SSL |
52 | Xuewang Zhang, Linlin Wang |
Key Technologies for Security Enhancing of Payment Gateway. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
payment gateway, security enhancing, fusion-based solution for SSL and SET protocols, secure hash algorithm, AES |
52 | Mohammed Assora, James Kadirire, Ayoub Shirvani |
Using WPKI for Security of Web Transaction. |
EC-Web |
2007 |
DBLP DOI BibTeX RDF |
Web transaction security, wireless security services, digital signature, SSL/TLS |
52 | Mohammed Assora, Ayoub Shirvani |
Enhancing the Security and Efficiency of 3-D Secure. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
3-D Secure, password based authentication and key exchange, online transaction security, SSL/TLS |
50 | Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo Rodenhaeuser, Bruno Kaiser |
A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA). |
KiVS |
2007 |
DBLP DOI BibTeX RDF |
|
50 | AbdelNasir Alshamsi, Takamichi Saito |
A Technical Comparison of IPSec and SSL. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Martin Vuagnoux |
Password Interception in a SSL/TLS Channel. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Vlastimil Klíma, Ondrej Pokorný, Tomás Rosa |
Attacking RSA-Based Sessions in SSL/TLS. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis |
Using SSL/TLS in authentication and key agreement procedures of future mobile networks. |
MWCN |
2002 |
DBLP DOI BibTeX RDF |
|
47 | Vipul Gupta, Sumit Gupta, Sheueling Chang Shantz, Douglas Stebila |
Performance analysis of elliptic curve cryptography for SSL. |
Workshop on Wireless Security |
2002 |
DBLP DOI BibTeX RDF |
secure socket layer (SSL), wireless, elliptic curve cryptography (ECC), internet security |
44 | Philippe Thomas |
Semi-Supervised Learning by Olivier Chapelle, Bernhard Schölkopf, and Alexander Zien (Review) |
IEEE Trans. Neural Networks |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Tony Jebara, Jun Wang 0006, Shih-Fu Chang |
Graph construction and b-matching for semi-supervised learning. |
ICML |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Kaizhu Huang, Zenglin Xu, Irwin King, Michael R. Lyu |
Semi-supervised Learning from General Unlabeled Data. |
ICDM |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Wen Wu, Jie Yang 0001 |
Semi-supervised learning of object categories from paired local features. |
CIVR |
2008 |
DBLP DOI BibTeX RDF |
semi-supervised learning, object classification |
44 | Jianguo Zhang, Fenghai Yu, Jianyong Sun, Yuanyuan Yang, Chenwen Liang |
DICOM Image Secure Communications With Internet Protocols IPv6 and IPv4. |
IEEE Trans. Inf. Technol. Biomed. |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Laurent Bernaille, Renata Teixeira |
Early Recognition of Encrypted Applications. |
PAM |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Chik How Tan, Joseph Chee Ming Teo |
Protection AgainstWeb-based Password Phishing. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Lars Völker, Marcus Schöller |
Secure TLS: Preventing DoS Attacks with Lower Layer Authentication. |
KiVS |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Thawatchai Chomsiri |
HTTPS Hacking Protection. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Jin-Ha Kim, Gyu Sang Choi, Chita R. Das |
A Load Balancing Scheme for Cluster-based Secure Network Servers. |
CLUSTER |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle |
The Design and Implementation of Protocol-Based Hidden Key Recovery. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Yoshiaki Shiraishi, Youji Fukuta, Masakatu Morii |
Remote Access VPN with Port Protection Function by Mobile Codes. |
WISA |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Qing Wang, Dwight J. Makaroff, H. Keith Edwards, Ryan Thompson |
Workload characterization for an E-commerce web site. |
CASCON |
2003 |
DBLP BibTeX RDF |
performance evaluation, electronic commerce, workload characterization |
44 | Lawrence C. Paulson |
Making Sense of Specifications: The Formalization of SET (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
44 | Robert Eschbach, Uwe Glässer, Reinhard Gotzhein, Andreas Prinz 0001 |
On the Formal Semantics of SDL-2000: A Compilation Approach Based on an Abstract SDL Machine. |
Abstract State Machines |
2000 |
DBLP DOI BibTeX RDF |
|
42 | Quratul-ain Mahesar, Asadullah Shah |
Securing XML Web Services by using a Proxy Web Service Model. |
SCSS (1) |
2007 |
DBLP DOI BibTeX RDF |
Security, Web Services, XML, SSL |
42 | Fang Qi, Feng Bao 0001, Tieyan Li, Weijia Jia 0001, Yongdong Wu |
Preventing Web-Spoofing with Automatic Detecting Security Indicator. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Automatic Detecting Security Indicator, SSL, Web Spoofing |
42 | Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi |
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
degenerate divisor, scalar multiplication, timing attack, SSL, efficient computation, hyperelliptic curve cryptosystem |
42 | Daniel Bleichenbacher |
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
PKCS, RSA, SSL, chosen ciphertext attack |
41 | Rolf Oppliger, Sebastian Gajek |
Effective Protection Against Phishing and Web Spoofing. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
visual spoofing, phishing, SSL/TLS, Web spoofing |
41 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis |
Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
Network Domain Security, Mobile Networks, UMTS, PKI, IPsec, SSL/TLS |
39 | Yongdong Wu, Haixia Yao, Feng Bao 0001 |
Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Christiaan J. Lamprecht, Aad P. A. van Moorsel |
Runtime Security Adaptation Using Adaptive SSL. |
PRDC |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Christiaan J. Lamprecht, Aad P. A. van Moorsel |
Adaptive SSL: Design, Implementation and Overhead Analysis. |
SASO |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Yongdong Wu, Feng Bao 0001 |
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski |
Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Hugo Krawczyk |
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
39 | Zhimin Song, Sihan Qing |
Applying NCP Logic to the Analysis of SSL 3.0. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
37 | Yoonyoung Lee, Soonhaeng Hur, Dongho Won, Seungjoo Kim |
Cipher Suite Setting Problem of SSL Protocol and it's Solutions. |
AINA Workshops |
2009 |
DBLP DOI BibTeX RDF |
Cipher Suite, Security, SSL, Secure Socket Layer |
36 | Rolf Oppliger, Ralf Hauser, David A. Basin |
SSL/TLS Session-Aware User Authentication. |
Computer |
2008 |
DBLP DOI BibTeX RDF |
man-in-the-middle (MITM) attacks, SSL/TLS protocols, security, user authentication |
35 | Merve Melis Simsek, Tamer Ergun, Hüseyin Temuçin |
SSL Test Suite: SSL Certificate Test Public Key Infrastructure. |
SIU |
2022 |
DBLP DOI BibTeX RDF |
|
35 | Wai-Kong Lee, Xian-Fu Wong, Bok-Min Goi, Raphael C.-W. Phan |
CUDA-SSL: SSL/TLS accelerated by GPU. |
ICCST |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Ren Zhao, Xiaohong Li 0001, Guangquan Xu, Zhiyong Feng 0002, Jianye Hao |
E-SSL: An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet. |
SOFL+MSVL |
2016 |
DBLP DOI BibTeX RDF |
|
35 | Sirikarn Pukkawanna, Gregory Blanc, Joaquín García-Alfaro, Youki Kadobayashi, Hervé Debar |
Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment. |
BADGERS@ESORICS |
2014 |
DBLP DOI BibTeX RDF |
|
35 | Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum |
Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
33 | Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy |
TruWallet: trustworthy and migratable wallet-based web authentication. |
STC |
2009 |
DBLP DOI BibTeX RDF |
password wallet, secure migration, trusted computing, phishing, identity theft |
33 | Kai Zhang 0001, James T. Kwok, Bahram Parvin |
Prototype vector machine for large scale semi-supervised learning. |
ICML |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Takamichi Saito, Kiyomi Sekiguchi, Ryosuke Hatsugai |
Authentication Binding between TLS and HTTP. |
NBiS |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Ben Adida |
Sessionlock: securing web sessions against eavesdropping. |
WWW |
2008 |
DBLP DOI BibTeX RDF |
web security |
33 | Haixin Wang, Guoqiang Bai 0001, Hongyi Chen |
Zodiac: System architecture implementation for a high-performance Network Security Processor. |
ASAP |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner 0001 |
Dynamic pharming attacks and locked same-origin policies for web browsers. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
same-origin policy, pharming, web authentication |
33 | Meng Wang 0001, Xian-Sheng Hua 0001, Xun Yuan 0001, Yan Song 0001, Li-Rong Dai 0001 |
Optimizing multi-graph learning: towards a unified video annotation scheme. |
ACM Multimedia |
2007 |
DBLP DOI BibTeX RDF |
semi-supervised learning, video annotation, multimodal fusion |
33 | Camille Gaspard, Batoul Haidar, Ayman I. Kayssi, Ali Chehab |
SmartSSL: Efficient Policy-Based Web Security. |
AICCSA |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Takamichi Saito, Ryosuke Hatsugai, Toshiyuki Kito |
On Compromising Password-Based Authentication over HTTPS. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Vipul Gupta, Matthew Millard, Stephen Fung, Yu Zhu, Nils Gura, Hans Eberle, Sheueling Chang Shantz |
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper). |
PerCom |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong |
HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong |
HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Ronald D. Blanton, John P. Hayes |
On the properties of the input pattern fault model. |
ACM Trans. Design Autom. Electr. Syst. |
2003 |
DBLP DOI BibTeX RDF |
fault testing, testing digital circuits, ATPG, fault models, faults, defects |
33 | Vorapranee Khu-smith, Chris J. Mitchell |
Enhancing E-commerce Security Using GSM Authentication. |
EC-Web |
2003 |
DBLP DOI BibTeX RDF |
E-commerce transactions security, GSM security, payment protocol |
33 | Takamichi Saito, Kentaro Umesawa, Toshiyuki Kito, Hiroshi G. Okuno |
Privacy-Enhanced SPKI Access Control on PKIX and Its Application to Web Server . |
AINA |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Lawrence C. Paulson |
Inductive Analysis of the Internet Protocol TLS (Position Paper). |
Security Protocols Workshop |
1998 |
DBLP DOI BibTeX RDF |
|
33 | Mark C. Hansen, John P. Hayes |
High-level test generation using physically-induced faults. |
VTS |
1995 |
DBLP DOI BibTeX RDF |
high-level test generation, physically-induced faults, industry-standard single stuck-line faults, independent functional faults, near-minimal size, fault diagnosis, logic testing, integrated circuit testing, design for testability, automatic testing, functional tests, failure analysis, benchmark circuits, circuit under test |
31 | Nabil Schear, David M. Nicol |
Performance Analysis of Real Traffic Carried with Encrypted Cover Flows. |
PADS |
2008 |
DBLP DOI BibTeX RDF |
security, discrete-event simulation, traffic analysis, network modeling, SSL |
30 | Heesun Park, Stan Redford |
Client certificate and IP address based multi-factor authentication for J2EE web applications. |
CASCON |
2007 |
DBLP DOI BibTeX RDF |
IP address checking, J2EE web application, SSL client certificate, certificate based authentication, multi-factor authentication |
30 | Linda Dailey Paulson |
News Briefs. |
Computer |
2005 |
DBLP DOI BibTeX RDF |
Encryption systems, Local SSL, Programmable mobile chips, Mobile processors, Mobile chips, Security, Internet, Wireless communications, Wireless communications |
30 | Ted Stanion, Carl Sechen |
Quasi-algebraic decompositions of switching functions. |
ARVLSI |
1995 |
DBLP DOI BibTeX RDF |
quasi-algebraic decompositions, algebraic product, binary Boolean operation, canonical manner, SSL testable, logic testing, testability, switching functions, switching functions, state assignment, minimisation of switching nets, benchmark circuits, circuit size |
28 | Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik |
Home Network Framework Based on OSGi Service Platform Using SSL Component Bundle. |
CIT |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Christina N. Michael, Xiao Su |
Incorporating a New Hash Function in OpenPGP and SSL/TLS. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Christof Fetzer, Gert Pfeifer, Trevor Jim |
Enhancing DNS Security using the SSL Trust Infrastructure. |
WORDS |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Massimo Benerecetti, Maurizio Panti, Luca Spalazzi, Simone Tacconi |
Verification of the SSL/TLS Protocol Using a Model Checkable Logic of Belief and Time. |
SAFECOMP |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Serge Vaudenay |
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS .... |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 706 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ >>] |
|