Skip to search form
Skip to main content
>
Semantic Scholar
Semantic Scholar's Logo
Search
Sign In
Create Free Account
You are currently offline. Some features of the site may not work correctly.
Comparison of SSH clients
Known as:
Ssh client
An SSH client is a software program which uses the secure shell protocol to connect to a remote computer. This article compares a selection of…
Expand
Wikipedia
Create Alert
Related topics
Related topics
42 relations
AIX
Android
Comparison of SSH servers
Comparison of remote desktop software
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
YANG Groupings for SSH Clients and SSH Servers
Liang Xia
,
G. Wu
,
Kent Watsen
2020
Corpus ID: 64546210
This document defines three YANG modules: the first defines groupings for a generic SSH client, the second defines groupings for…
Expand
2019
2019
CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks
P. Cao
,
Y. Wu
,
+4 authors
R. Iyer
NSDI
2019
Corpus ID: 73725085
This paper describes CAUDIT1, an operational system deployed at the National Center for Supercomputing Applications (NCSA) at the…
Expand
2015
2015
Advanced solution of SIP communication server with a new approach to management
M. Voznák
,
J. Slachta
,
Lukas Macura
,
K. Tomala
Telecommun. Syst.
2015
Corpus ID: 10825369
The paper deals with the development of an advanced solution for a SIP communication server. Works were carried out within the…
Expand
2013
2013
Ensuring high-quality randomness in cryptographic key generation
Henry Corrigan-Gibbs
,
Wendy Mu
,
D. Boneh
,
B. Ford
CCS
2013
Corpus ID: 2375444
The security of any cryptosystem relies on the secrecy of the system's secret keys. Yet, recent experimental work demonstrates…
Expand
2011
2011
High Performance Computing Clouds
A. Goscinski
,
Michael Brock
,
Philip Church
CloudCom
2011
Corpus ID: 59748070
ion results in poor performance — despite the fact that performance and ease of use are two unrelated fields. To test performance…
Expand
Highly Cited
2008
Highly Cited
2008
Program Analysis with Dynamic Precision Adjustment
Dirk Beyer
,
T. Henzinger
,
Grégory Théoduloz
23rd IEEE/ACM International Conference on…
2008
Corpus ID: 8022549
We present and evaluate a framework and tool for combining multiple program analyses which allows the dynamic (on-line…
Expand
2008
2008
Analysis and implementation of secure console server based on embedded Linux
Fuxiang Gao
,
Fengyun Li
,
Shengfei Bao
,
X. Wang
IEEE International Conference on Industrial…
2008
Corpus ID: 20268711
Many devices are managed through serial interface nowadays, but if devices controlled are located in different places with…
Expand
2008
2008
Intrusion detection in encrypted accesses with SSH protocol to network public servers
V.A. Foroushani
,
F. Adibnia
,
E. Hojati
International Conference on Computer and…
2008
Corpus ID: 14647129
While various network applications are common, attack against them, cause some serious problems. Intrusion detection system (IDS…
Expand
2006
2006
Generic Message Exchange Authentication for the Secure Shell Protocol (SSH)
Frank Cusack
,
M. Forssen
RFC
2006
Corpus ID: 7105562
The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network…
Expand
2005
2005
An Implementation of Interactive Jobs Submission for Grid Computing Portals
Haili Xiao
,
Hong Wu
,
X. Chi
,
Sungen Deng
,
H. Zhang
ACSW
2005
Corpus ID: 944236
The Globus Toolkit has been widely used as middleware in Grid computing environments. Java CoG, Web Service and Portlet help to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE