Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,869,409 papers from all fields of science
Search
Sign In
Create Free Account
Transport Layer Security
Known as:
SSL 2.0
, Certificate pinning
, TLS False Start
Expand
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as "SSL", are cryptographic protocols…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
389 Directory Server
Android
Apache Wave
App Store Approval Process
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
CHIRALITY OF HIGH-LATITUDE FILAMENTS OVER SOLAR CYCLE 23
A. Yeates
,
D. Mackay
2012
Corpus ID: 73692005
A non-potential quasi-static evolution model coupling the Sun's photospheric and coronal magnetic fields is applied to the…
Expand
2006
2006
C4W: An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks
Qi Jing
,
Jian-bin Hu
,
Zhong Chen
IEEE International Conference on Mobile Ad Hoc…
2006
Corpus ID: 3434912
With hardware support and software optimization, public key cryptography (PKC) has been announced feasible on micro sensors…
Expand
Highly Cited
2006
Highly Cited
2006
A Transmission Line Method to Compute the Far-Field Radiation of Arbitrarily Directed Hertzian Dipoles in a Multilayer Dielectric Structure: Theory and Applications
X. Wu
,
A. Kishk
,
A. Glisson
IEEE Transactions on Antennas and Propagation
2006
Corpus ID: 23080819
A transmission line method is proposed to compute the far-field radiation patterns of arbitrarily directed Hertzian dipoles that…
Expand
2005
2005
Measuring performance impact of security protocols in wireless local area networks
A. K. Agarwal
,
Wenye Wang
2nd International Conference on Broadband…
2005
Corpus ID: 376162
In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and…
Expand
Highly Cited
2004
Highly Cited
2004
An HMAC processor with integrated SHA-1 and MD5 algorithms
Mao-Yin Wang
,
Chih-Pin Su
,
Chih-Tsun Huang
,
Cheng-Wen Wu
Asia and South Pacific Design Automation…
2004
Corpus ID: 6577464
Cryptographic algorithms are prevalent and important in digital communications and storage, e.g., both SHA-1 and MD5 algorithms…
Expand
2004
2004
PESO: low overhead protection for Ethernet over SONET transport
A. Srivastava
,
S. Acharya
,
P. Risbood
,
B. Gupta
IEEE INFOCOM
2004
Corpus ID: 26272848
This paper addresses the issue of reliable transport of emerging data services in Ethernet over SONET (EoS) networks that require…
Expand
Highly Cited
2001
Highly Cited
2001
Reliable transmission of video over ad-hoc networks using automatic repeat request and multipath transport
S. Mao
,
Shunan Lin
,
S. Panwar
,
Yao Wang
IEEE 54th Vehicular Technology Conference. VTC…
2001
Corpus ID: 4324961
The increase in the bandwidth of the wireless channels and the computing power of the mobile devices makes it possible to offer…
Expand
Highly Cited
2000
Highly Cited
2000
Optimal planning for optical transport networks
S. Lanning
,
Debasis Mitra
,
Qiong Wang
,
Margaret H. Wright
Philosophical Transactions of the Royal Society…
2000
Corpus ID: 16362749
In optical transport networks, recent development of new technologies has led to highly accelerated (‘disruptive’) increases in…
Expand
Highly Cited
1995
Highly Cited
1995
Mobility management in integrated wireless-ATM networks
B. Rajagopalan
ACM/IEEE International Conference on Mobile…
1995
Corpus ID: 2083634
There is an emerging interest in integrating mobile wireless communication with Broadband ISDN based on the ATM technology. Many…
Expand
Highly Cited
1984
Highly Cited
1984
Current transport in boeing (Cd, Zn)/CuInSe2solar cells
W. A. Miller
,
L. Olsen
IEEE Transactions on Electron Devices
1984
Corpus ID: 28921442
The current versus voltage (I-V) and capacitance characteristics of Boeing (Cd, Zn)S/CuInSe2solar cells are investigated and a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required