Stewart et al., 2015 - Google Patents
Optimizing TLS for high-bandwidth applications in FreeBSDStewart et al., 2015
View PDF- Document ID
- 5986037250076283328
- Author
- Stewart R
- Gurney J
- Long S
- Publication year
- Publication venue
- Proc. Asia BSD conference
External Links
Snippet
Transport Layer Security (TLS) is becoming increasingly desirable and necessary in the modern Internet. Unfortunately it also induces heavy penalties on application CPU performance for both the client and server. In this paper we examine the server-side …
- 235000008469 Oxalis tuberosa 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30899—Browsing optimisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10977362B2 (en) | Program execution and data proof scheme using multiple key pair signatures | |
| AU2019204725B2 (en) | Retrieving access data for blockchain networks using highly available trusted execution environments | |
| US20250227098A1 (en) | Self-encrypting key management system | |
| JP2020528224A (en) | Secure execution of smart contract operations in a reliable execution environment | |
| US20220368537A1 (en) | Robust state synchronization for stateful hash-based signatures | |
| US10623186B1 (en) | Authenticated encryption with multiple contexts | |
| US20220078024A1 (en) | State synchronization for post-quantum signing facilities | |
| US12328297B1 (en) | File sharing over secure connections | |
| US10250596B2 (en) | Monitoring encrypted communication sessions | |
| US11394546B2 (en) | Encrypted data key management | |
| US10708269B1 (en) | Hosted application access management | |
| JP2020522164A (en) | Method, device and program for TLS inspection | |
| US10686769B2 (en) | Secure key caching client | |
| Stewart et al. | Optimizing TLS for high-bandwidth applications in FreeBSD | |
| Giblin et al. | Securing Kafka with encryption-at-rest | |
| Wei et al. | Heterogeneous-PAKE: Bridging the gap between PAKE protocols and their real-world deployment | |
| US9800568B1 (en) | Methods for client certificate delegation and devices thereof | |
| Lee et al. | Parallel implementation of GCM on GPUs | |
| US11271968B2 (en) | Zero round trip time transmission for anticipatory request messages | |
| JP2023535011A (en) | quantum streaming | |
| US12438722B1 (en) | Cross-platform access control | |
| US20250300811A1 (en) | Methods for migrating private hardware security keys and devices thereof | |
| Sun et al. | Using the cryptographic accelerators in the ultrasparc t1 and t2 processors | |
| WO2023069441A2 (en) | Low-latency multi-key encryption and decryption engine and techniques | |
| Li | The Application of Encryption Algorithm in Information Security Reflected |