نتایج جستجو برای: ssl

تعداد نتایج: 1571  

2009
Amarnag Subramanya Jeff Bilmes

We consider the issue of scalability of graph-based semi-supervised learning (SSL) algorithms. In this context, we propose a fast graph node ordering algorithm that improves (parallel) spatial locality by being cache cognizant. This approach allows for a near linear speedup on a shared-memory parallel machine to be achievable, and thus means that graph-based SSL can scale to very large data set...

2010
Yoshi Ohno

The purpose of this article is to solicit comments from the solid state lighting (SSL) industry on the Color Quality Scale (CQS) developed by National Institute of Standards and Technology (NIST). The CQS is being discussed as one of the proposals in the International Commission on Illumination (CIE) Technical Committee (TC) 1-69 and final discussions are in progress in the TC toward selecting ...

2015

RC4 is the most popular stream cipher in the world. In fact, as of March 2015, RC4 is estimated to protect as much as 30% of SSL traffic, likely amounting to billions of TLS connections every day. Yet it suffers a critical – and long known – weakness known as the Invariance Weakness. In this paper we will revisit the Invariance Weakness – a 13-year old vulnerability of RC4 that is based on huge...

Journal: :IEICE Transactions on Information and Systems 2012

2005
Kent Inge Simonsen Vebjørn Moen Kjell Jørgen Hole

Key generation on resource-constrained devices is a challenging task. This paper describes a proof-of-concept implementation of an attack on Sun’s reference implementation of the Mobile Information Device Profile (MIDP). It is known that this implementation has a flaw in the generation of the premaster secret in SSL. The attack recovers the symmetric keys and plaintext from an SSL session.

2013
Sascha Fahl

In previous work [1] we demonstrated severe problems with the way Android applications use SSL. We performed an in-depth study of 13,500 Android apps and discovered that a large number of apps did not use SSL correctly and thus, were vulnerable to Man-In-The-Middle attacks. To make these threats a reality, an attacker needs to execute an active man-in-the-middle attack (MITMA). While MITMAs are...

2018
Xiu-Chai Zheng Wei Ren Shuang Zhang Ting Zhong Xiao-Chuan Duan Yi-Fan Yin Mei-Qi Xu Yan-Li Hao Zhan-Tao Li Hui Li Man Liu Zhuo-Yue Li Xuan Zhang

Background In the present study, the tumor-specific, pH-responsive peptide H7K(R2)2-modified, theranostic liposome-containing paclitaxel (PTX) and superparamagnetic iron oxide nanoparticles (SPIO NPs), PTX/SPIO-SSL-H7K(R2)2, was prepared by using H7K(R2)2 as the targeting ligand, SPIO NPs as the magnetic resonance imaging (MRI) agent, PTX as antitumor drug. Methods The PTX/SPIO-SSL-H7K(R2)2 w...

2017
Chang Liu Xiao-Na Liu Gui-Ling Wang Yu Hei Shuai Meng Ling-Fei Yang Lan Yuan Ying Xie

As the global population ages, cancer rates increase worldwide, and degenerative diseases of the central nervous system (CNS), brain tumors, and inflammation threaten human health more frequently. We designed a dual-mediated (receptor-mediated and adsorption-mediated) liposome, named transferrin-cell penetrating peptide-sterically stabilized liposome (TF-CPP-SSL), to improve therapy for gliomas...

Journal: :CoRR 2017
Guido C. H. E. de Croon

Self-supervised learning (SSL) is a reliable learning mechanism in which a robot enhances its perceptual capabilities. Typically, in SSL a trusted, primary sensor cue provides supervised training data to a secondary sensor cue. In this article, a theoretical analysis is performed on the fusion of the primary and secondary cue in a minimal model of SSL. A proof is provided that determines the sp...

2012
Kuljeet Kaur G Geetha

Identity over the public links becomes quiet complex as Client and Server needs proper access rights with authentication. For determining clients identity with password Secured Shell Protocol or Public Key Infrastructure is deployed by various organizations. For end to end transport security SSL (Secured Socket Layer) is the de facto standard having Record and Handshake protocol dealing with da...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید