• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 13,499
Next 10 →

Table 1. Unique Certificate for a partial handshake

in Batching SSL/TLS Handshake Improved ⋆
by Fang Qi, Yongdong Wu
"... In PAGE 3: ... (2) Another method is to re-use the message serverHello.random in the pro- tocol as shown in Table1 . For simplicity, We only show the related processes and the modified information in the standard SSL/TLS handshake protocol.... ..."

Table 1. Unique Certiflcate for a partial handshake.

in Batching SSL/TLS Handshake Improved ⋆
by Fang Qi, Weijia Jia, Feng Bao, Yongdong Wu
"... In PAGE 3: ... (2) Another method is to re-use the message serverHello.random in the pro- tocol as shown in Table1 . For simplicity, We only show the related processes and the modifled information in the standard SSL/TLS handshake protocol.... ..."

Table 1: Handshake protocols

in Development of an Autonomous Transport System using UML-RT
by Robert S, Alle Rechte Vorbehalten, Technischen Universität München, Ingolf Krüger, Ingolf Krüger, Wolfgang Prenninger, Wolfgang Prenninger, Robert Sandner 2001

TABLE I THE AMOUNT OF TRANSMITTED DATA DURING A TLS HANDSHAKE.

in Comparison Studies between Pre-Shared Key and Public Key Exchange Mechanisms for Transport Layer Security (TLS
by Fang-chun Kuo, Hannes Tschofenig, Fabian Meyer, Xiaoming Fu 2006

TABLE I THE AMOUNT OF TRANSMITTED DATA DURING A TLS HANDSHAKE.

in Comparison Studies between Pre-Shared Key and Public Key Exchange Mechanisms for Transport Layer Security (TLS
by Fang-chun Kuo, Hannes Tschofenig, Fabian Meyer, Xiaoming Fu 2006

Table 7-1. SSL/TLS Cipher Suites

in GUIDELINES ON SECURING PUBLIC WEB SERVERS
by Miles Tracy, Wayne Jansen, Karen Scarfone, Theodore Winograd, Recommendations Of The National, Theodore Winograd, Carlos M. Gutierrez 2007
"... In PAGE 7: ...igure 7-1. SSL/TLS Location within the Internet Protocol Stack .............................................7-3 Table7 -1.... In PAGE 78: ... Among other functions, the SSL/TLS handshake protocols determine how the Web server and Web client negotiate which cipher suites they will use to authenticate each other, transmit certificates, and establish session keys. Table7 -1 provides a list of Federal cipher suites, their recommended usage, and their relative strength [SSL98 and Chow02]. ... ..."

Table 1: Time needed by the sensor nodes to per- form SSL/TLS handshake

in performance measures
by Krzysztof Piotrowski
"... In PAGE 2: ...wo kinds of handshake, i.e., the RSA and the ECC based handshake. Table1 presents the time needed for the calcu- lations only to make the results independent from the type of radio device available at the sensor node [4]. The modulo exponentiation with the big private exponent is the main and most expensive part of the full RSA-1024 handshake.... In PAGE 5: ...Table1 0: Power consumed while reception of a sig- nature on cc2420 and cc1000 single chip transceiver Signature Size cc2420 cc1000 433 MHz 868 MHz [bit] [ J] [ Ws] [ Ws] ECDSA-160 320 72.32 184.... In PAGE 5: ...74 1536.00 Table1 1: Power consumed while sending a signature on cc2420 and cc1000 single chip transceiver with -5 dBm and 0 dBm output power Signature Size cc2420 cc1000 433 MHz 868 MHz [bit] [ Ws] [ Ws] [ Ws] Output power -5 dBm ECDSA-160 320 53.76 222.... ..."

Table 4.1: The amount of the transmitted data during a TLS handshake. Mechanism Data Amount (bytes)

in Comparison Studies between Pre-Shared Key and Public Key Exchange Mechanisms for Transport Layer Security (TLS
by Technische Berichte, An Der Georg-august-universität Göttingen, Georg-august-universität Göttingen, Fang-chun Kuo, Fang-chun Kuo, Hannes Tschofenig, Hannes Tschofenig, Fabian Meyer, Fabian Meyer, Xiaoming Fu 2006

Table 5: Time needed by the sensor nodes to perform SSL/TLS handshake Sensor node RSA-1024 Performance

in Deliverable nature: Dissemination level:
by unknown authors

Table 2: Power consumed by the sensor nodes to perform SSL/TLS handshake Sensor node RSA-1024 Power consumption

in How Public Key Cryptography Influences
by Wireless Sensor Node, Krzysztof Piotrowski, Peter Langendoerfer, Steffen Peter 2006
Cited by 10
Next 10 →
Results 1 - 10 of 13,499
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University