Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

HTTPS

Known as: HTTPS:/, Https., HTTP TLS 
HTTPS (also called HTTP over TLS, HTTP over SSL, and HTTP Secure) is a protocol for secure communication over a computer network which is widely used… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2019
Highly Cited
2019
In this paper, we address the scene segmentation task by capturing rich contextual dependencies based on the self-attention… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2019
Highly Cited
2019
We propose spatially-adaptive normalization, a simple but effective layer for synthesizing photorealistic images given an input… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Highly Cited
2019
Highly Cited
2019
Attention mechanisms have seen wide adoption in neural NLP models. In addition to improving predictive performance, these are… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Highly Cited
2019
Highly Cited
2019
Neural language representation models such as BERT pre-trained on large-scale corpora can well capture rich semantic patterns… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Highly Cited
2018
Highly Cited
2018
We present a network architecture for processing point clouds that directly operates on a collection of points represented as a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2017
Highly Cited
2017
While humans easily recognize relations between data from different domains without any supervision, learning to automatically… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2017
Highly Cited
2017
This software note announces a new open-source release of the Maxent software for modeling species distributions from occurrence… Expand
  • figure 1
  • figure 2
  • table 1
Highly Cited
2013
Highly Cited
2013
We report the results of a large-scale measurement study of the HTTPS certificate ecosystem---the public-key infrastructure that… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2009
Highly Cited
2009
Web-based applications rely on the HTTPS protocol to guarantee privacy and security in transactions ranging from home banking, e… Expand
  • figure 1
Highly Cited
2000
Highly Cited
2000
This memo describes how to use TLS to secure HTTP connections over the Internet. Current practice is to layer HTTP over SSL (the… Expand