Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,394,724 papers from all fields of science
Search
Sign In
Create Free Account
Comparison of TLS implementations
Known as:
Comparison of SSL implementations
, Secure Transport
The Transport Layer Security (TLS) protocol provides the ability to secure communications across networks. This comparison of TLS implementations…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AES instruction set
ARM architecture
Application-Layer Protocol Negotiation
Assembly language
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Enhancing and evaluating an architecture for privacy in the integration of Internet of Things and cloud computing
L. Pacheco
,
E. Alchieri
,
P. S. Barreto
IEEE International Symposium on Network Computing…
2017
Corpus ID: 23575912
Through the Internet of Things (IoT) a large number of devices are connected to the Internet, resulting in a huge amount of…
Expand
2013
2013
SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains
A. Dvir
,
L. Buttyán
,
T. Thong
IEEE International Conference on Communications…
2013
Corpus ID: 5668224
Transport protocols for Wireless Sensor Networks (WSNs) are designed to fulfill both reliability and energy efficiency…
Expand
2012
2012
Design of security transmission system for the internet
Li Xiao-nan
,
Dai Zibin
,
Wu Zai-He
,
Luo Jing-shu
International Conference on Information…
2012
Corpus ID: 13471440
Due to the imperfect situation of Embedded network equipment security mechanism, the paper designs a security transmission system…
Expand
2010
2010
A Stepwise Approach Towards an Interoperable and Flexible Logging Principle for Audit Trails
David Huemer
,
A. Tjoa
Seventh International Conference on Information…
2010
Corpus ID: 10117748
Although event recording on a computer system (also known as logging) is of utmost importance for reconstructing and detecting…
Expand
2008
2008
Identifying Opportunities for Web Services Security Performance Optimizations
Robert A. van Engelen
,
Wei Zhang
IEEE Congress on Services
2008
Corpus ID: 726234
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties…
Expand
2007
2007
Extracting relevant named entities for automated expense reimbursement
Guangyu Zhu
,
Timothy J. Bethea
,
Vikas Krishna
Knowledge Discovery and Data Mining
2007
Corpus ID: 3334730
Expense reimbursement is a time-consuming and labor-intensive process across organizations. In this paper, we present a prototype…
Expand
2006
2006
Coercion-Resistant Electronic Elections with Observer
Jörn Schweisgut
Electronic Voting
2006
Corpus ID: 5969726
We introduce an electronic election scheme, that is coercion-resistant, a notion introduced by Juels et al. in [JCJ05]. In our…
Expand
2003
2003
A seamless mobile VPN data solution for UMTS and WLAN users
P. Feder
,
N. Lee
,
S. Martin-Leon
2003
Corpus ID: 16279982
Mobile virtual private networks (MVPNs) can provide remote users with easy, secure high-speed access to their enterprise network…
Expand
2002
2002
STUDY OF A ROAD SURFACE CONDITION DETECTION TECHNIQUE IN THE HUMAN CENTERED ITS VIEW AID SYSTEM
M. Yamada
,
T. Oshima
,
K. Ued
,
I. Horiba
,
S. Yamamoto
2002
Corpus ID: 107946849
The human centered ITS view aid system is an advanced driver assistance system aiming at helpful, appropriate and not annoying…
Expand
2001
2001
A proxy-based security architecture for Internet applications in an extranet environment
Andy Dowling
,
J. G. Keating
Journal of Systems and Software
2001
Corpus ID: 44371007
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE