Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,463,658 papers from all fields of science
Search
Sign In
Create Free Account
Transport Layer Security
Known as:
SSL 2.0
, Certificate pinning
, TLS False Start
Expand
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as "SSL", are cryptographic protocols…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
389 Directory Server
Android
Apache Wave
App Store Approval Process
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Transport Layer Security
S. Turner
IEEE Internet Computing
2014
Corpus ID: 11926864
Transport Layer Security is the standard, widely deployed protocol for securing client-server communications over the Internet…
Expand
Review
2013
Review
2013
A Survey on Mobility and Mobility-Aware MAC Protocols in Wireless Sensor Networks
Qian Dong
,
W. Dargie
IEEE Communications Surveys and Tutorials
2013
Corpus ID: 16186303
In wireless sensor networks nodes can be static or mobile, depending on the application requirements. Dealing with mobility can…
Expand
Highly Cited
2012
Highly Cited
2012
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
Kevin P. Dyer
,
Scott E. Coull
,
Thomas Ristenpart
,
Thomas Shrimpton
IEEE Symposium on Security and Privacy
2012
Corpus ID: 861248
We consider the setting of HTTP traffic over encrypted tunnels, as used to conceal the identity of websites visited by a user. It…
Expand
Highly Cited
2010
Highly Cited
2010
Market Value of Voluntary Disclosures Concerning Information Security
Lawrence A. Gordon
,
Martin P. Loeb
,
Tashfeen Sohail
MIS Q.
2010
Corpus ID: 1137135
Information security is a fundamental concern for corporations operating in today's digital economy. The number of firms…
Expand
Highly Cited
2010
Highly Cited
2010
High-Power and High-Efficiency InGaN-Based Light Emitters
A. Laubsch
,
M. Sabathil
,
J. Baur
,
M. Peter
,
Berthold Hahn
IEEE Transactions on Electron Devices
2010
Corpus ID: 24243505
In this paper, we report on the latest advancements in improving AlGaInN-based visible-light-emitting-diode (LED) efficiency in…
Expand
Highly Cited
2010
Highly Cited
2010
Co-regularization Based Semi-supervised Domain Adaptation
Hal Daumé
,
Abhishek Kumar
,
A. Saha
Neural Information Processing Systems
2010
Corpus ID: 12789480
This paper presents a co-regularization based approach to semi-supervised domain adaptation. Our proposed approach (EA++) builds…
Expand
Highly Cited
2009
Highly Cited
2009
Identity-Based Authentication for Cloud Computing
Hongwei Li
,
Yuan-Shun Dai
,
Ling Tian
,
Haomiao Yang
International Conference on Cloud Computing
2009
Corpus ID: 1590026
Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous…
Expand
Highly Cited
2007
Highly Cited
2007
A game theory approach for the allocation of risks in transport public private partnerships
F. Medda
2007
Corpus ID: 205350048
Highly Cited
2005
Highly Cited
2005
CrN-Ag self-lubricating hard coatings
C. Mulligan
,
D. Gall
2005
Corpus ID: 28162356
Highly Cited
2004
Highly Cited
2004
Proactive key distribution using neighbor graphs
Arunesh Mishra
,
Minho Shin
,
N. L. Petroni
,
T. Clancy
,
W. Arbaugh
IEEE wireless communications
2004
Corpus ID: 10570135
User mobility in wireless data networks is increasing because of technological advances, and the desire for voice and multimedia…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE