|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 58 occurrences of 39 keywords
|
|
|
Results
Found 28 publication records. Showing 28 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
190 | Albert Levi, Erkay Savas |
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol. |
ISCC |
2003 |
DBLP DOI BibTeX RDF |
|
159 | Bin Li |
A Forward-Secrecy WTLS Handshake Protocol Based on XTR. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
WTLS, Intermediator Attack, Forward Secrecy, XTR |
159 | Jin Kwak, Jongsu Han, Soohyun Oh, Dongho Won |
Security Enhanced WTLS Handshake Protocol. |
ICCSA (3) |
2004 |
DBLP DOI BibTeX RDF |
WTLS, WAP, active attack, Handshake protocol |
91 | Phongsak Prasithsangaree, Prashant Krishnamurthy |
A Variation of the WTLS Authentication Protocol for Reducing Energy Consumption in Wireless Devices. |
HSNMC |
2004 |
DBLP DOI BibTeX RDF |
|
91 | Dong Jin Kwak, JaeCheol Ha, Hoon-Jae Lee 0001, Hwankoo Kim, Sang-Jae Moon |
A WTLS Handshake Protocol with User Anonymity and Forward Secrecy. |
CDMA International Conference |
2002 |
DBLP DOI BibTeX RDF |
|
88 | Nicolas Sklavos 0001, Paris Kitsos, K. Papadopoulos, Odysseas G. Koufopavlou |
Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security. |
J. Supercomput. |
2006 |
DBLP DOI BibTeX RDF |
WTLS implementation, WAP security, wireless networks, wireless communications, security system |
52 | Serge Vaudenay |
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS .... |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
52 | Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae |
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS. |
ICOIN |
2001 |
DBLP DOI BibTeX RDF |
|
52 | Ian Herwono, Ingo Liebhardt |
Performance of WTLS and Its Impact on an M-commerce Transaction. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
40 | Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae |
Security Enhancement on Mobile Commerce. |
Human.Society@Internet |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Tianjun Wu, Yong Ge, Jianghao Wang, Alfred Stein, Yongze Song, Yunyan Du, Jiang-Hong Ma |
A WTLS-Based Method for Remote Sensing Imagery Registration. |
IEEE Trans. Geosci. Remote. Sens. |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Yijun He, Moon-Chuen Lee |
Improving WTLS Security for WAP Based Mobile e-Commerce. |
Wirel. Pers. Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Ruishan Zhang, Kefei Chen |
Improvements on the WTLS protocol to avoid denial of service attacks. |
Comput. Secur. |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Burak Bayoglu, Albert Levi, Erkay Savas |
Performance Evaluation of End-to-End Security in Wireless Applications using WTLS Handshake Protocol. |
New Trends in Computer Networks |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Michael Bungert, Oliver Pfaff |
Das WAP-Sicherheitsprotokoll WTLS. |
Datenschutz und Datensicherheit |
1999 |
DBLP BibTeX RDF |
|
32 | Markku-Juhani Olavi Saarinen |
Attacks against the WAP WTLS protocol. |
Communications and Multimedia Security |
1999 |
DBLP BibTeX RDF |
|
28 | Anand Raghunathan, Nachiketh R. Potlapally, Srivaths Ravi 0001 |
Securing Wireless Data: System Architecture Challenges. |
ISSS |
2002 |
DBLP DOI BibTeX RDF |
WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing |
28 | Hiroto Yasuura, Hiroyuki Tomiyama, Takanori Okuma, Yun Cao |
Data Memory Design Considering Effective Bitwidth for Low-Energy Embedded Systems. |
ISSS |
2002 |
DBLP DOI BibTeX RDF |
WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing |
20 | Billy Bob Brumley, Kimmo U. Järvinen |
Fast Point Decompression for Standard Elliptic Curves. |
EuroPKI |
2008 |
DBLP DOI BibTeX RDF |
square roots modulo p, elliptic curve cryptography, exponentiation, addition chains |
20 | Yijun He, Nan Xu, Jie Li |
A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Sungduk Kim, Kyungjin Kim, Jaedong Jung, Dongho Won |
An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
proof of possession, signcryption, POP |
20 | Chih-Ming Yan, Wen-Chen Sun, Tzu-Yen Wang, Tzu-Han Kao, Shyan-Ming Yuan |
Design and Implementation of WAP Certificate Converter Toolkit. |
MDM |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho |
Formal analysis of card-based payment systems in mobile devices. |
ACSW |
2006 |
DBLP BibTeX RDF |
card-based systems, formal verification, mobile payment, electronic payments |
20 | Katsuyuki Takashima |
New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Ramesh Karri, Piyush Mishra |
Analysis of Energy Consumed by Secure Session Negotiation Protocols in Wireless Networks. |
PATMOS |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Gökhan Kahraman, Semih Bilgen |
Wireless Application Protocol Transport Layer Performance. |
ISCC |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Louis Goubin |
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards |
20 | Jong-Phil Yang, Weon Shin, Kyung Hyune Rhee |
An End-to-End Authentication Protocol in Wireless Application Protocol. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #28 of 28 (100 per page; Change: )
|
|