Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,564,799 papers from all fields of science
Search
Sign In
Create Free Account
Comparison of TLS implementations
Known as:
Comparison of SSL implementations
, Secure Transport
The Transport Layer Security (TLS) protocol provides the ability to secure communications across networks. This comparison of TLS implementations…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AES instruction set
ARM architecture
Application-Layer Protocol Negotiation
Assembly language
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through Minimal Latency
Pengkun Li
,
Jinshu Su
,
Xiaofeng Wang
SIGCOMM Posters and Demos
2019
Corpus ID: 199661416
Transport Layer Security (TLS) and Datagram TLS (DTLS) are the de-facto protocols of Internet of Things (IoT) for end-to-end…
Expand
2017
2017
Enhancing and evaluating an architecture for privacy in the integration of Internet of Things and cloud computing
L. Pacheco
,
E. Alchieri
,
P. S. Barreto
IEEE International Symposium on Network Computing…
2017
Corpus ID: 23575912
Through the Internet of Things (IoT) a large number of devices are connected to the Internet, resulting in a huge amount of…
Expand
2013
2013
SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains
A. Dvir
,
L. Buttyán
,
T. Thong
IEEE International Conference on Communications…
2013
Corpus ID: 5668224
Transport protocols for Wireless Sensor Networks (WSNs) are designed to fulfill both reliability and energy efficiency…
Expand
2012
2012
Design of security transmission system for the internet
Li Xiao-nan
,
Dai Zibin
,
Wu Zai-He
,
Luo Jing-shu
International Conference on Information…
2012
Corpus ID: 13471440
Due to the imperfect situation of Embedded network equipment security mechanism, the paper designs a security transmission system…
Expand
2008
2008
Identifying Opportunities for Web Services Security Performance Optimizations
Robert A. van Engelen
,
Wei Zhang
IEEE Congress on Services
2008
Corpus ID: 726234
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties…
Expand
2007
2007
Extracting relevant named entities for automated expense reimbursement
Guangyu Zhu
,
Timothy J. Bethea
,
Vikas Krishna
Knowledge Discovery and Data Mining
2007
Corpus ID: 3334730
Expense reimbursement is a time-consuming and labor-intensive process across organizations. In this paper, we present a prototype…
Expand
2007
2007
On the Specification of Secure Channels
G. Lowe
2007
Corpus ID: 7986923
Security architectures often make use of secure transport protocols to protect network messages: the transport protocols provide…
Expand
2006
2006
The levitation controller design of an electromagnetic suspension vehicle using gain scheduled control
Min-Soo Kim
,
Y. Byun
,
Young-hoon Lee
,
Kwangjoo Lee
2006
Corpus ID: 55297971
Maglev vehicles constitute a new class of transport systems that has been constantly developed and improved to become a new…
Expand
2003
2003
A seamless mobile VPN data solution for UMTS and WLAN users
P. Feder
,
N. Lee
,
S. Martin-Leon
2003
Corpus ID: 16279982
Mobile virtual private networks (MVPNs) can provide remote users with easy, secure high-speed access to their enterprise network…
Expand
2001
2001
A proxy-based security architecture for Internet applications in an extranet environment
Andy Dowling
,
J. G. Keating
Journal of Systems and Software
2001
Corpus ID: 44371007
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE