Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,435,950 papers from all fields of science
Search
Sign In
Create Free Account
Comparison of TLS implementations
Known as:
Comparison of SSL implementations
, Secure Transport
The Transport Layer Security (TLS) protocol provides the ability to secure communications across networks. This comparison of TLS implementations…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AES instruction set
ARM architecture
Application-Layer Protocol Negotiation
Assembly language
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Secure data uploading scheme for a smart home system
Jian Shen
,
Chen Wang
,
Tong Li
,
Xiaofeng Chen
,
Xinyi Huang
,
Zhi-hui Zhan
Information Sciences
2018
Corpus ID: 49418649
2017
2017
Enhancing and evaluating an architecture for privacy in the integration of Internet of Things and cloud computing
L. Pacheco
,
E. Alchieri
,
P. S. Barreto
IEEE International Symposium on Network Computing…
2017
Corpus ID: 23575912
Through the Internet of Things (IoT) a large number of devices are connected to the Internet, resulting in a huge amount of…
Expand
2012
2012
Lossless image cryptography algorithm based on discrete cosine transform
Sara Tedmori
,
Nijad A. Al-Najdawi
˜The œinternational Arab journal of information…
2012
Corpus ID: 6417798
T he science of cryptography has recently attracted significant attention, as progressively more information is stored and…
Expand
2008
2008
Specifying Secure Transport Channels
Christopher Dilloway
,
G. Lowe
IEEE Computer Security Foundations Symposium
2008
Corpus ID: 15756906
Security architectures often make use of secure transport protocols to protect network messages: the transport protocols provide…
Expand
Review
2007
Review
2007
Wireless Security and Cryptography: Specifications and Implementations
N. Sklavos
,
Xinmiao Zhang
2007
Corpus ID: 60999316
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this…
Expand
2007
2007
Extracting relevant named entities for automated expense reimbursement
Guangyu Zhu
,
Timothy J. Bethea
,
Vikas Krishna
Knowledge Discovery and Data Mining
2007
Corpus ID: 3334730
Expense reimbursement is a time-consuming and labor-intensive process across organizations. In this paper, we present a prototype…
Expand
2006
2006
Coercion-Resistant Electronic Elections with Observer
Jörn Schweisgut
Electronic Voting
2006
Corpus ID: 5969726
We introduce an electronic election scheme, that is coercion-resistant, a notion introduced by Juels et al. in [JCJ05]. In our…
Expand
2003
2003
A seamless mobile VPN data solution for UMTS and WLAN users
P. Feder
,
N. Lee
,
S. Martin-Leon
2003
Corpus ID: 16279982
Mobile virtual private networks (MVPNs) can provide remote users with easy, secure high-speed access to their enterprise network…
Expand
2001
2001
Performance consideration on the WAP secure transport layer
L. Brodo
,
C. Priami
2001
Corpus ID: 168948625
Review
2000
Review
2000
A review of the state of the art of personal rapid transit
J. Anderson
2000
Corpus ID: 5908996
The paper begins with a review of the rational for development of personal rapid transit, the reasons it has taken so long to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE