|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 373 occurrences of 242 keywords
|
|
|
Results
Found 1359 publication records. Showing 1359 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
159 | Cristian Coarfa, Peter Druschel, Dan S. Wallach |
Performance analysis of TLS Web servers. |
ACM Trans. Comput. Syst. |
2006 |
DBLP DOI BibTeX RDF |
RSA accelerator, secure Web servers, Internet, e-commerce, TLS |
110 | Cosmin E. Oancea, Alan Mycroft, Tim Harris 0001 |
A lightweight in-place implementation for software thread-level speculation. |
SPAA |
2009 |
DBLP DOI BibTeX RDF |
roll-back, thread-level speculation (tls) |
102 | Venkatesan Packirisamy, Yangchun Luo, Wei-Lung Hung, Antonia Zhai, Pen-Chung Yew, Tin-Fook Ngai |
Efficiency of thread-level speculation in SMT and CMP architectures - performance, power and thermal perspective. |
ICCD |
2008 |
DBLP DOI BibTeX RDF |
|
102 | Manohar K. Prabhu, Kunle Olukotun |
Exposing speculative thread parallelism in SPEC2000. |
PPoPP |
2005 |
DBLP DOI BibTeX RDF |
SPEC CPU2000, feedback-driven optimization, manual parallel programming, chip multiprocessors, multithreading, thread-level speculation |
101 | Wei Liu 0014, James Tuck 0001, Luis Ceze, Wonsun Ahn, Karin Strauss, Jose Renau, Josep Torrellas |
POSH: a TLS compiler that exploits program structure. |
PPoPP |
2006 |
DBLP DOI BibTeX RDF |
TLS compiler, profiling, prefetching, thread-level speculation, multi-core architecture |
96 | Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo Rodenhaeuser, Bruno Kaiser |
A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA). |
KiVS |
2007 |
DBLP DOI BibTeX RDF |
|
93 | Jose Renau, James Tuck 0001, Wei Liu 0014, Luis Ceze, Karin Strauss, Josep Torrellas |
Tasking with out-of-order spawn in TLS chip multiprocessors: microarchitecture and compilation. |
ICS |
2005 |
DBLP DOI BibTeX RDF |
|
91 | Christopher J. F. Pickett, Clark Verbrugge |
Software Thread Level Speculation for the Java Language and Virtual Machine Environment. |
LCPC |
2005 |
DBLP DOI BibTeX RDF |
|
82 | Lawrence C. Paulson |
Inductive Analysis of the Internet Protocol TLS (Position Paper). |
Security Protocols Workshop |
1998 |
DBLP DOI BibTeX RDF |
|
79 | Jose Renau, Karin Strauss, Luis Ceze, Wei Liu 0014, Smruti R. Sarangi, James Tuck 0001, Josep Torrellas |
Thread-Level Speculation on a CMP can be energy efficient. |
ICS |
2005 |
DBLP DOI BibTeX RDF |
|
79 | Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk |
Universally Composable Security Analysis of TLS. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
TLS/SSL, secure sessions, key exchange, Universal Composability |
79 | Diana Berbecaru, Antonio Lioy |
On the Robustness of Applications Based on the SSL and TLS Security Protocols. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
MITM attack, security, SSL/TLS, truncation attack |
71 | David J. Boyd |
TLS client handshake with a payment card. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
71 | Daigo Manabe, Shigetomo Kimura, Yoshihiko Ebihara |
A Compression Method Designed for SMTP over TLS. |
ICOIN |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval |
Provably secure password-based authentication in TLS. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
encrypted key exchange, password authentication, TLS |
68 | Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell |
A modular correctness proof of IEEE 802.11i and TLS. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
protocol composition logic, TLS, IEEE 802.11i |
68 | Jakob Jonsson, Burton S. Kaliski Jr. |
On the Security of RSA Encryption in TLS. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
key encapsulation, RSA encryption, TLS |
68 | Lawrence C. Paulson |
Inductive Analysis of the Internet Protocol TLS. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
inductive method, proof tools, authentication, TLS, Isabelle |
68 | Liangmin Zhou, Lijing Lin, Yiming Wei 0001, Sanzheng Qiao |
Perturbation analysis and condition numbers of scaled total least squares problems. |
Numer. Algorithms |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classifications (2000) 65F20, 65F35 |
68 | Arun Kejariwal, Xinmin Tian, Wei Li 0015, Milind Girkar, Sergey Kozhukhov, Hideki Saito 0001, Utpal Banerjee, Alexandru Nicolau, Alexander V. Veidenbaum, Constantine D. Polychronopoulos |
On the performance potential of different types of speculative thread-level parallelism: The DL version of this paper includes corrections that were not made available in the printed proceedings. |
ICS |
2006 |
DBLP DOI BibTeX RDF |
DOALL loops, value dependence, performance evaluation, data dependence, speculative execution, control dependence |
68 | Sang Keun Yoo, Hyun Gon Kim |
Analysis and Design of Secure and Reliable Transmission Protocol in Diameter. |
CDMA International Conference |
2002 |
DBLP DOI BibTeX RDF |
|
68 | Minghui Xia, Eli Saber, Gaurav Sharma 0001, A. Murat Tekalp |
End-to-end color printer calibration by total least squares regression. |
IEEE Trans. Image Process. |
1999 |
DBLP DOI BibTeX RDF |
|
67 | Yijun Zeng, Omar Cherkaoui |
Performance Study of COPS over TLS and IPsec Secure Session. |
DSOM |
2002 |
DBLP DOI BibTeX RDF |
IPsec and TLS, COPS |
59 | Kutluyil Dogancay |
Relationship Between Geometric Translations and TLS Estimation Bias in Bearings-Only Target Localization. |
IEEE Trans. Signal Process. |
2008 |
DBLP DOI BibTeX RDF |
|
59 | Lars Völker, Marcus Schöller |
Secure TLS: Preventing DoS Attacks with Lower Layer Authentication. |
KiVS |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Nau Okamoto, Shigetomo Kimura, Yoshihiko Ebihara |
An Introduction of Compression Algorithms into SSL/TLS and Proposal of Compression Algorithms Specialized for Application. |
AINA |
2003 |
DBLP DOI BibTeX RDF |
|
57 | Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk |
Provably secure browser-based user-aware mutual authentication over TLS. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
browser-based protocols, phishing, user authentication, TLS |
57 | Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer |
HMAC is a randomness extractor and applications to TLS. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
key extraction, TLS, HMAC, randomness extraction |
57 | Karthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu |
Cryptographically verified implementations for TLS. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
verified implementations, authentication, cryptographic protocols, SSL, TLS, secrecy |
57 | Sebastian Gajek, Lijun Liao, Jörg Schwenk |
Stronger TLS bindings for SAML assertions and SAML artifacts. |
SWS |
2008 |
DBLP DOI BibTeX RDF |
client certificate, fim, saml, tls |
57 | Hovav Shacham, Dan Boneh, Eric Rescorla |
Client-side caching for TLS. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
session cache, wireless networks, Bloom filters, TLS |
57 | Kevin J. Ma, Radim Bartos |
Analysis of Transport Optimization Techniques. |
ICWS |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Stanley L. C. Fung, J. Gregory Steffan |
Improving cache locality for thread-level speculation. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
57 | André Adelsbach, Sebastian Gajek, Jörg Schwenk |
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
57 | Vorapranee Khu-smith, Chris J. Mitchell |
Using GSM to enhance e-commerce security. |
Workshop Mobile Commerce |
2002 |
DBLP DOI BibTeX RDF |
GSM security, mobile or Internet payment protocol, E-commerce security |
54 | Mohamad Badra, Samer El-Sawda, Ibrahim Hajjeh |
Phishing attacks and solutions. |
MobiMedia |
2007 |
DBLP DOI BibTeX RDF |
RSA, phishing, public key infrastructures, TLS, Diffie-Hellman, SRP |
54 | Georgios Kambourakis, Angelos N. Rouskas, Dimitris Gritzalis |
Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
AKA, WLAN, UMTS, PKI, TLS, EAP |
53 | Seong-Soo Park 0001, Jong-Hyouk Lee, Tai-Myoung Chung |
Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment. |
ICCSA (1) |
2009 |
DBLP DOI BibTeX RDF |
Proxy MIPv6, EAP-TLS, Authentication, Certificate, BAN Logic |
53 | Frederik Armknecht, Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Gianluca Ramunno, Davide Vernizzi |
An efficient implementation of trusted channels based on openssl. |
STC |
2008 |
DBLP DOI BibTeX RDF |
openSSL, transport layer security (TLS), trusted channel, trusted computing (TC), attestation |
53 | Mohammed Assora, James Kadirire, Ayoub Shirvani |
Using WPKI for Security of Web Transaction. |
EC-Web |
2007 |
DBLP DOI BibTeX RDF |
Web transaction security, wireless security services, digital signature, SSL/TLS |
53 | Mohammed Assora, Ayoub Shirvani |
Enhancing the Security and Efficiency of 3-D Secure. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
3-D Secure, password based authentication and key exchange, online transaction security, SSL/TLS |
48 | Takamichi Saito, Kiyomi Sekiguchi, Ryosuke Hatsugai |
Authentication Binding between TLS and HTTP. |
NBiS |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Sepideh Fouladgar, Bastien Mainaud, Khaled Masmoudi, Hossam Afifi |
Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Yun Dai, Ren Zhang 0002, Yan-Xia Lin |
The Probability Distribution of Distance TSS-TLS Is Organism Characteristic and Can Be Used for Promoter Prediction. |
IEA/AIE |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Martin Vuagnoux |
Password Interception in a SSL/TLS Channel. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Vlastimil Klíma, Ondrej Pokorný, Tomás Rosa |
Attacking RSA-Based Sessions in SSL/TLS. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis |
Using SSL/TLS in authentication and key agreement procedures of future mobile networks. |
MWCN |
2002 |
DBLP DOI BibTeX RDF |
|
45 | Venkatesan Packirisamy, Antonia Zhai, Wei-Chung Hsu, Pen-Chung Yew, Tin-Fook Ngai |
Exploring speculative parallelism in SPEC2006. |
ISPASS |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, John McLean |
Applying Formal Methods to a Certifiably Secure Software System. |
IEEE Trans. Software Eng. |
2008 |
DBLP DOI BibTeX RDF |
security, verification, Formal methods, Specification, Software, tools, software verification, security kernels |
45 | Jianguo Zhang, Fenghai Yu, Jianyong Sun, Yuanyuan Yang, Chenwen Liang |
DICOM Image Secure Communications With Internet Protocols IPv6 and IPv4. |
IEEE Trans. Inf. Technol. Biomed. |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Mark Grechanik, Kathryn S. McKinley, Dewayne E. Perry |
Recovering and using use-case-diagram-to-source-code traceability links. |
ESEC/SIGSOFT FSE |
2007 |
DBLP DOI BibTeX RDF |
LeanArt, traceability links, machine learning, program analysis, use case diagram |
45 | Yaobin Wang, Hong An, Bo Liang, Li Wang, Ming Cong, Yongqing Ren |
Balancing Thread Partition for Efficiently Exploiting Speculative Thread-Level Parallelism. |
APPT |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Arun Kejariwal, Xinmin Tian, Milind Girkar, Wei Li 0015, Sergey Kozhukhov, Utpal Banerjee, Alexandru Nicolau, Alexander V. Veidenbaum, Constantine D. Polychronopoulos |
Tight analysis of the performance potential of thread speculation using spec CPU 2006. |
PPoPP |
2007 |
DBLP DOI BibTeX RDF |
conflict probability, misspeculation penalty, threading overhead, performance evaluation, speculative execution |
45 | Wei Xing Zheng 0001 |
On noisy FIR filtering via total least squares estimation. |
ISCAS (3) |
2004 |
DBLP DOI BibTeX RDF |
|
45 | Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle |
The Design and Implementation of Protocol-Based Hidden Key Recovery. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
45 | Manohar K. Prabhu, Kunle Olukotun |
Using thread-level speculation to simplify manual parallelization. |
PPoPP |
2003 |
DBLP DOI BibTeX RDF |
feedback-driven optimization, manual parallel programming, chip multiprocessor, multithreading, data speculation |
45 | Jovanka Ciric, Gin Yee, Carl Sechen |
Delay Minimization and Technology Mapping of Two-Level Structures and Implementation Using Clock-Delayed Domino Logic. |
DATE |
2000 |
DBLP DOI BibTeX RDF |
|
43 | Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, N. Asokan |
Beyond secure channels. |
STC |
2007 |
DBLP DOI BibTeX RDF |
state changes, trusted channel, virtualization, trusted computing, hypervisor, TLS, microkernel, remote attestation, relay attack |
43 | Yu Gu 0003, Wei Zhang, Hengchang Liu, Baohua Zhao, Yugui Qu |
Energy-Efficient Target Localization Based on a Prediction Model. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
wireless sensor networks, energy-efficient, prediction model, TLS |
42 | Dimitri Mankowski, Thom Wiggers, Veelasha Moonsamy |
TLS â' Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
42 | Dimitri Mankowski, Thom Wiggers, Veelasha Moonsamy |
TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android. |
EuroS&P Workshops |
2023 |
DBLP DOI BibTeX RDF |
|
42 | Li Yan 0003, Junxiang Tan, Hua Liu 0002, Hong Xie 0002, Changjun Chen |
Automatic Registration of TLS-TLS and TLS-MLS Point Clouds Using a Genetic Algorithm. |
Sensors |
2017 |
DBLP DOI BibTeX RDF |
|
42 | Yuanyuan Zhou 0001, Pin Zhou, Feng Qin, Wei Liu 0014, Josep Torrellas |
Efficient and flexible architectural support for dynamic monitoring. |
ACM Trans. Archit. Code Optim. |
2005 |
DBLP DOI BibTeX RDF |
dynamic monitoring, thread-level speculation (TLS), software debugging, Architectural support |
42 | Ulrike Meyer, Jared Cordasco, Susanne Wetzel |
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs. |
WMASH |
2005 |
DBLP DOI BibTeX RDF |
EAP-TLS-KS, distributed DSS, inter-provider roaming, micropayment scheme, WLAN, secret sharing, PKI, 802.11i |
42 | Rolf Oppliger, Sebastian Gajek |
Effective Protection Against Phishing and Web Spoofing. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
visual spoofing, phishing, SSL/TLS, Web spoofing |
37 | Chao Lv, Hui Li 0006, Jianfeng Ma 0001 |
Analysis the Properties of TLS Based on Temporal Logic of Knowledge. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Paul Rabinovich |
ECL: A TLS Extension for Authentication in Complex PKIs. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Homin K. Lee, Tal Malkin, Erich M. Nahum |
Cryptographic strength of ssl/tls servers: current and recent practices. |
Internet Measurement Conference |
2007 |
DBLP DOI BibTeX RDF |
network security, servers, ssl |
37 | Baris Kayayurt, Tugkan Tuglular |
End-to-end security implementation for mobile devices using TLS protocol. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Arvind Nayak, Emanuele Trucco, Neil A. Thacker |
When are Simple LS Estimators Enough? An Empirical Study of LS, TLS, and GTLS. |
Int. J. Comput. Vis. |
2006 |
DBLP DOI BibTeX RDF |
generalized total least squares, 2-D homography, correlated noise, least squares, total least squares |
37 | Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski |
Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Kazuhiro Ogata 0001, Kokichi Futatsugi |
Equational Approach to Formal Analysis of TLS. |
ICDCS |
2005 |
DBLP DOI BibTeX RDF |
security, verification, algebraic specification, rewriting, interactive theorem proving |
37 | Gregorio Díaz 0001, Fernando Cuartero, Valentín Valero Ruiz, Fernando L. Pelayo |
Automatic verification of the TLS handshake protocol. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
authentication protocols and model checking, system verification and model checking, security, e-Commerce, authentication protocols |
37 | Christoph S. Garbe, Hagen Spies, Bernd Jähne |
Mixed OLS-TLS for the Estimation of Dynamic Processes with a Linear Source Term. |
DAGM-Symposium |
2002 |
DBLP DOI BibTeX RDF |
brightness change, parameter estimation, optical flow, least squares, dynamic processes |
37 | Michael Steiner 0001, Peter Buhler, Thomas Eirich, Michael Waidner |
Secure password-based cipher suite for TLS. |
ACM Trans. Inf. Syst. Secur. |
2001 |
DBLP DOI BibTeX RDF |
transport layer security, weak secret, password, key agreement, dictionary attack, Authenticated key exchange, perfect forward secrecy, secure channel |
34 | Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek |
Secure Bindings of SAML Assertions to TLS Sessions. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
Authentication, Single-Sign-On, SSL, SAML, TLS, Kerberos, Federated Identity Management |
34 | Xiangyu Kong, Chang-Hua Hu, Chongzhao Han |
A Self-Stabilizing Neural Algorithm for Total Least Squares Filtering. |
Neural Process. Lett. |
2009 |
DBLP DOI BibTeX RDF |
Total least square filtering, Linear system identification, Adaptive algorithm, FIR filters |
34 | Polychronis Xekalakis, Nikolas Ioannou, Marcelo Cintra |
Combining thread level speculation helper threads and runahead execution. |
ICS |
2009 |
DBLP DOI BibTeX RDF |
multi-cores, thread-level speculation, helper threads, runahead execution |
34 | Antonia Zhai, J. Gregory Steffan, Christopher B. Colohan, Todd C. Mowry |
Compiler and hardware support for reducing the synchronization of speculative threads. |
ACM Trans. Archit. Code Optim. |
2008 |
DBLP DOI BibTeX RDF |
automatic parallelization, instruction scheduling, Thread-level speculation, chip-multiprocessing |
34 | Peng Wu 0001, Arun Kejariwal, Calin Cascaval |
Compiler-Driven Dependence Profiling to Guide Program Parallelization. |
LCPC |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Mihai Burcea, J. Gregory Steffan, Cristiana Amza |
The potential for variable-granularity access tracking for optimistic parallelism. |
MSPC |
2008 |
DBLP DOI BibTeX RDF |
dependence tracking, variable granularity, transactional memory, thread-level speculation |
34 | Christopher B. Colohan, Anastassia Ailamaki, J. Gregory Steffan, Todd C. Mowry |
CMP Support for Large and Dependent Speculative Threads. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
databases, Multiprocessor Systems, cache coherence, thread-level speculation |
34 | Md. Mafijul Islam |
Predicting Loop Termination to Boost Speculative Thread-Level Parallelism in Embedded Applications. |
SBAC-PAD |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Keigo Hirakawa, Thomas W. Parks |
Image denoising using total least squares. |
IEEE Trans. Image Process. |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, John D. McLean |
Formal specification and verification of data separation in a separation kernel for an embedded system. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
code verification, formal specification, theorem proving, formal model, separation kernel |
34 | Christopher B. Colohan, Anastassia Ailamaki, J. Gregory Steffan, Todd C. Mowry |
Tolerating Dependences Between Large Speculative Threads Via Sub-Threads. |
ISCA |
2006 |
DBLP DOI BibTeX RDF |
|
34 | J. Gregory Steffan, Christopher B. Colohan, Antonia Zhai, Todd C. Mowry |
The STAMPede approach to thread-level speculation. |
ACM Trans. Comput. Syst. |
2005 |
DBLP DOI BibTeX RDF |
cache coherence, automatic parallelization, Thread-level speculation, chip-multiprocessing |
34 | Matthias Mühlich, Rudolf Mester |
A Fast Algorithm for Statistically Optimized Orientation Estimation. |
DAGM-Symposium |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Braxton Thomason, Craig Chase |
Partially ordered epochs for thread-level speculation. |
Conf. Computing Frontiers |
2005 |
DBLP DOI BibTeX RDF |
partially-ordered threads, automatic parallelization, thread-level speculation |
34 | Phongsak Prasithsangaree, Prashant Krishnamurthy |
A Variation of the WTLS Authentication Protocol for Reducing Energy Consumption in Wireless Devices. |
HSNMC |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Pino Persiano, Ivan Visconti |
A secure and private system for subscription-based remote services. |
ACM Trans. Inf. Syst. Secur. |
2003 |
DBLP DOI BibTeX RDF |
cryptographic algorithms and protocols, privacy, world-wide web, Access control, anonymity |
34 | Michael K. Chen, Kunle Olukotun |
TEST: A Tracer for Extracting Speculative Thread. |
CGO |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Vorapranee Khu-smith, Chris J. Mitchell |
Enhancing E-commerce Security Using GSM Authentication. |
EC-Web |
2003 |
DBLP DOI BibTeX RDF |
E-commerce transactions security, GSM security, payment protocol |
34 | J. Gregory Steffan, Christopher B. Colohan, Antonia Zhai, Todd C. Mowry |
Improving Value Communication for Thread-Level Speculation. |
HPCA |
2002 |
DBLP DOI BibTeX RDF |
parallelization, multithreaded, Speculation, value prediction |
34 | Antonia Zhai, Christopher B. Colohan, J. Gregory Steffan, Todd C. Mowry |
Compiler optimization of scalar value communication between speculative threads. |
ASPLOS |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Rolf Oppliger, Ralf Hauser, David A. Basin |
SSL/TLS Session-Aware User Authentication. |
Computer |
2008 |
DBLP DOI BibTeX RDF |
man-in-the-middle (MITM) attacks, SSL/TLS protocols, security, user authentication |
32 | Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mathew Eszenyi, Shay Gueron, David Durham |
Encrypting the internet. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
GCM, cryptographic algorithm acceleration, AES, RSA, HTTPS, secure communications, SSL, TLS |
31 | K. R. Jayaram, Aditya P. Mathur |
On the Adequacy of Statecharts as a Source of Tests for Cryptographic Protocols. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
TLS protocol, MC/DC coverage, Security protocol, Statechart, Security Vulnerability |
31 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis |
Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
Network Domain Security, Mobile Networks, UMTS, PKI, IPsec, SSL/TLS |
28 | M. E. Abdelhafez, Sureswaran Ramadass, Mustafa Abdelwahab |
TLS Guard for TLS 1.3 zero round-trip time (0-RTT) in a distributed environment. |
J. King Saud Univ. Comput. Inf. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1359 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|