Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,712,660 papers from all fields of science
Search
Sign In
Create Free Account
Comparison of TLS implementations
Known as:
Comparison of SSL implementations
, Secure Transport
The Transport Layer Security (TLS) protocol provides the ability to secure communications across networks. This comparison of TLS implementations…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AES instruction set
ARM architecture
Application-Layer Protocol Negotiation
Assembly language
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Enhancing and evaluating an architecture for privacy in the integration of Internet of Things and cloud computing
L. Pacheco
,
E. Alchieri
,
P. S. Barreto
IEEE International Symposium on Network Computing…
2017
Corpus ID: 23575912
Through the Internet of Things (IoT) a large number of devices are connected to the Internet, resulting in a huge amount of…
Expand
2013
2013
SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains
A. Dvir
,
L. Buttyán
,
T. Thong
IEEE International Conference on Communications…
2013
Corpus ID: 5668224
Transport protocols for Wireless Sensor Networks (WSNs) are designed to fulfill both reliability and energy efficiency…
Expand
Review
2013
Review
2013
A Survey on Real-Time Secure Transport System
Z. Dai
,
Feng Wang
,
H. Deng
International Conference on Intelligent Networks…
2013
Corpus ID: 16454718
With increased global interconnectivity, reliance on network services and Internet communication, real-time transport system…
Expand
2012
2012
Design of security transmission system for the internet
Li Xiao-nan
,
Dai Zibin
,
Wu Zai-He
,
Luo Jing-shu
International Conference on Information…
2012
Corpus ID: 13471440
Due to the imperfect situation of Embedded network equipment security mechanism, the paper designs a security transmission system…
Expand
2008
2008
Identifying Opportunities for Web Services Security Performance Optimizations
Robert A. van Engelen
,
Wei Zhang
IEEE Congress on Services
2008
Corpus ID: 726234
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties…
Expand
2007
2007
Extracting relevant named entities for automated expense reimbursement
Guangyu Zhu
,
Timothy J. Bethea
,
Vikas Krishna
Knowledge Discovery and Data Mining
2007
Corpus ID: 3334730
Expense reimbursement is a time-consuming and labor-intensive process across organizations. In this paper, we present a prototype…
Expand
2007
2007
On the Specification of Secure Channels
G. Lowe
2007
Corpus ID: 7986923
Security architectures often make use of secure transport protocols to protect network messages: the transport protocols provide…
Expand
2003
2003
A seamless mobile VPN data solution for UMTS and WLAN users
P. Feder
,
N. Lee
,
S. Martin-Leon
2003
Corpus ID: 16279982
Mobile virtual private networks (MVPNs) can provide remote users with easy, secure high-speed access to their enterprise network…
Expand
2001
2001
A proxy-based security architecture for Internet applications in an extranet environment
Andy Dowling
,
J. G. Keating
Journal of Systems and Software
2001
Corpus ID: 44371007
2001
2001
Performance consideration on the WAP secure transport layer
L. Brodo
,
C. Priami
2001
Corpus ID: 168948625
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE