Tisovsky et al., 2012
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| US8898451B2 (en) | Method and system for monitoring encrypted data transmissions | |
| US11805097B2 (en) | Decrypting transport layer security traffic without Man-in-the-Middle proxy | |
| US11085964B2 (en) | Systems and methods for intellectual property-secured, remote debugging | |
| US11153289B2 (en) | Secure communication acceleration using a System-on-Chip (SoC) architecture | |
| Pudelko et al. | Performance analysis of VPN gateways | |
| US11374973B2 (en) | Streamlining cryptographic processes in a test environment | |
| Groen et al. | Securing O-RAN open interfaces | |
| US20230403136A1 (en) | Computer and Network Interface Controller Securely Offloading Encryption Keys and Encryption Processing to the Network Interface Controller | |
| Zeidler et al. | Performance evaluation of transport layer security in the 5G core control plane | |
| CN108718268B (en) | Method for improving concurrent processing performance of VPN (virtual private network) server | |
| Zhao et al. | On the (dis) advantages of programmable nics for network security services | |
| Gallenmüller et al. | DTLS Performance-How Expensive is Security? | |
| Tisovsky et al. | Analytical model of IPsec process throughput | |
| Ha et al. | ASIC design of IPSec hardware accelerator for network security | |
| Feghali et al. | Security: Adding Protection to the Network via the Network Processor. | |
| Sabbagh et al. | Evaluation of WireGuard and OpenVPN VPN solutions | |
| CA2592713C (en) | Method and system for monitoring encrypted data transmissions | |
| Vora | Side-channel security in networks: from the internet to interconnects | |
| Da-Yuan et al. | Implementation and performance evaluation of IPSec VPN based on netfilter | |
| Tuovinen | FPGA implementation of confidential computing enclave | |
| Moghimifar et al. | Predicting tls performance from key exchange performance: short paper | |
| Zou | Network performance and key management of VPN tunnels between autonomous vehicles | |
| Dabi et al. | Enabling Support for TLS and TLS Fingerprinting in Network Stack Tester | |
| Zhao et al. | MIKA: A Minimalist Approach to Hybrid Key Exchange | |
| Pudelko et al. | Performance Analysis of VPN Gateways Performanceanalyse von VPN Gateways |