Network Security Services

Known as: NSS 
In computing, Network Security Services (NSS) comprises a set of libraries designed to support cross-platform development of security-enabled client… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Generation of electricity from solar energy has gained worldwide acceptance due to its abundant availability and eco-friendly… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems… (More)
  • figure 1
  • table I
  • table II
  • table III
  • table IV
Is this relevant?
2010
2010
A video sequence is more than a sequence of still images. It contains a strong spatial–temporal correlation between the regions… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 6
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Trend analyses were performed on several indicators of Arctic haze using data from sites located in the North American, Norwegian… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
2006
2006
On large networks security administration tasks such as patch management and event log analysis can take many hours and even days… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • figure 1
Is this relevant?
2006
2006
We re-examine the antikaon condensation in neutron star (NS) matter within the extended Zimanyi-Moszkowski model. The meson-kaon… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
To protect a network, secure network systems such as intrusion detection system (IDS) and firewall are often installed to control… (More)
  • figure 1
  • table 1
  • figure 3
  • figure 2
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource… (More)
  • table 1
  • figure 1
  • table 2
Is this relevant?
Highly Cited
1994
Highly Cited
1994
This paper describes an algorithm for automatically interpreting noun sequences in unrestricted text. This system uses… (More)
  • table I
  • table 2
  • figure 2
  • figure 2
  • figure 1
Is this relevant?