Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Transport Layer Security

Known as: SSL 2.0, Certificate pinning, TLS False Start 
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as "SSL", are cryptographic protocols… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to… Expand
  • figure 2
Is this relevant?
Highly Cited
2015
Highly Cited
2015
This book includes the following chapters : Introduction; Mathematics of Cryptography; Traditional Symmetric-Key Ciphers… Expand
Is this relevant?
Highly Cited
2014
Highly Cited
2014
  • S. Turner
  • IEEE Internet Computing
  • 2014
  • Corpus ID: 11926864
Transport Layer Security is the standard, widely deployed protocol for securing client-server communications over the Internet… Expand
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
This document describes a mechanism that enables the Transport Layer Security (TLS) server to resume sessions and avoid keeping… Expand
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
This document specifies Version 1.1 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications… Expand
  • figure 2
Is this relevant?
Highly Cited
2006
Highly Cited
2006
This document describes new key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security… Expand
  • figure 1
  • table 6
Is this relevant?
Highly Cited
2005
Highly Cited
2005
This document specifies three sets of new ciphersuites for the Transport Layer Security (TLS) protocol to support authentication… Expand
Is this relevant?