Skip to search formSkip to main contentSkip to account menu

Comparison of TLS implementations

Known as: Comparison of SSL implementations, Secure Transport 
The Transport Layer Security (TLS) protocol provides the ability to secure communications across networks. This comparison of TLS implementations… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Through the Internet of Things (IoT) a large number of devices are connected to the Internet, resulting in a huge amount of… 
2013
2013
Transport protocols for Wireless Sensor Networks (WSNs) are designed to fulfill both reliability and energy efficiency… 
2012
2012
Due to the imperfect situation of Embedded network equipment security mechanism, the paper designs a security transmission system… 
2010
2010
Although event recording on a computer system (also known as logging) is of utmost importance for reconstructing and detecting… 
2008
2008
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties… 
2007
2007
Expense reimbursement is a time-consuming and labor-intensive process across organizations. In this paper, we present a prototype… 
2006
2006
We introduce an electronic election scheme, that is coercion-resistant, a notion introduced by Juels et al. in [JCJ05]. In our… 
2003
2003
Mobile virtual private networks (MVPNs) can provide remote users with easy, secure high-speed access to their enterprise network… 
2002
2002
The human centered ITS view aid system is an advanced driver assistance system aiming at helpful, appropriate and not annoying…