{"id":"https://openalex.org/W2068211749","doi":"https://doi.org/10.1145/1128817.1128826","title":"Improving secure server performance by re-balancing SSL/TLS handshakes","display_name":"Improving secure server performance by re-balancing SSL/TLS handshakes","publication_year":2006,"publication_date":"2006-03-21","ids":{"openalex":"https://openalex.org/W2068211749","doi":"https://doi.org/10.1145/1128817.1128826","mag":"2068211749"},"language":"en","primary_location":{"id":"doi:10.1145/1128817.1128826","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1128817.1128826","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 ACM Symposium on Information, computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066888184","display_name":"Claude Castelluccia","orcid":null},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Claude Castelluccia","raw_affiliation_strings":["INRIA Zirst, Saint Ismier, Cedex, France"],"affiliations":[{"raw_affiliation_string":"INRIA Zirst, Saint Ismier, Cedex, France","institution_ids":["https://openalex.org/I1326498283"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088599826","display_name":"Einar Mykletun","orcid":null},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Einar Mykletun","raw_affiliation_strings":["University of California, Irvine Irvine, CA"],"affiliations":[{"raw_affiliation_string":"University of California, Irvine Irvine, CA","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009882362","display_name":"Gene Tsudik","orcid":"https://orcid.org/0000-0002-8467-8614"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gene Tsudik","raw_affiliation_strings":["University of California, Irvine Irvine, CA"],"affiliations":[{"raw_affiliation_string":"University of California, Irvine Irvine, CA","institution_ids":["https://openalex.org/I204250578"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5066888184"],"corresponding_institution_ids":["https://openalex.org/I1326498283"],"apc_list":null,"apc_paid":null,"fwci":7.228,"has_fulltext":false,"cited_by_count":72,"citation_normalized_percentile":{"value":0.9687572,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"26","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8523941040039062},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.7925577163696289},{"id":"https://openalex.org/keywords/transport-layer-security","display_name":"Transport Layer Security","score":0.7298532724380493},{"id":"https://openalex.org/keywords/handshake","display_name":"Handshake","score":0.6899398565292358},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5304486155509949},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5064221620559692},{"id":"https://openalex.org/keywords/web-server","display_name":"Web server","score":0.49758556485176086},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.48709988594055176},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4591817557811737},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4430030882358551},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.43447816371917725},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.42901864647865295},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.36322659254074097},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3507966101169586},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.18001201748847961},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.08364865183830261}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8523941040039062},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.7925577163696289},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.7298532724380493},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.6899398565292358},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5304486155509949},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5064221620559692},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.49758556485176086},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.48709988594055176},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4591817557811737},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4430030882358551},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.43447816371917725},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.42901864647865295},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.36322659254074097},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3507966101169586},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.18001201748847961},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.08364865183830261},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1128817.1128826","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1128817.1128826","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 ACM Symposium on Information, computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W181098788","https://openalex.org/W310700731","https://openalex.org/W1496801598","https://openalex.org/W1508772548","https://openalex.org/W1510550025","https://openalex.org/W1530462290","https://openalex.org/W1530613379","https://openalex.org/W1532312962","https://openalex.org/W1551056197","https://openalex.org/W1567403662","https://openalex.org/W1575893707","https://openalex.org/W1660562555","https://openalex.org/W1675137049","https://openalex.org/W1721847811","https://openalex.org/W1799981655","https://openalex.org/W1863981525","https://openalex.org/W1917973592","https://openalex.org/W1996360405","https://openalex.org/W2016332932","https://openalex.org/W2019689629","https://openalex.org/W2053464283","https://openalex.org/W2065474377","https://openalex.org/W2162788772","https://openalex.org/W2166780626","https://openalex.org/W2246745336","https://openalex.org/W2286477783","https://openalex.org/W2914841653","https://openalex.org/W4232836212","https://openalex.org/W4285719527","https://openalex.org/W6610974252","https://openalex.org/W6629830587","https://openalex.org/W6630342060","https://openalex.org/W6631682812","https://openalex.org/W6634467650","https://openalex.org/W6636975353","https://openalex.org/W6637158563","https://openalex.org/W6639041609","https://openalex.org/W6758529199"],"related_works":["https://openalex.org/W4296873577","https://openalex.org/W4295681914","https://openalex.org/W4313064690","https://openalex.org/W2503991861","https://openalex.org/W2516734788","https://openalex.org/W2612638001","https://openalex.org/W2347296673","https://openalex.org/W1971902782","https://openalex.org/W4319159013","https://openalex.org/W2337566776"],"abstract_inverted_index":{"Much":[0],"of":[1,38,47,57,69,109,131,133,156,164],"today's":[2],"distributed":[3],"computing":[4],"takes":[5],"place":[6],"in":[7,14,18,120,193],"a":[8,30,85,162,177,185],"client":[9],"/server":[10],"model.":[11],"Despite":[12],"advances":[13],"fault":[15],"tolerance":[16],"-":[17],"particular,":[19],"replication":[20],"and":[21,111,197],"load":[22,98],"distribution":[23,99],"--":[24],"server":[25,80],"overload":[26,41],"remains":[27],"to":[28,79,103,113,167],"be":[29,76,184],"major":[31],"problem.":[32],"In":[33],"the":[34,39,44,67,171],"Web":[35],"context,":[36],"one":[37],"main":[40],"factors":[42],"is":[43],"direct":[45],"consequence":[46],"expensive":[48],"Public":[49],"Key":[50],"operations":[51,74,160],"performed":[52],"by":[53,100,138,161],"servers":[54,64,112],"as":[55],"part":[56,108],"each":[58],"SSL":[59,122,190],"handshake.":[60],"Since":[61],"most":[62],"SSL-enabled":[63],"use":[65],"RSA,":[66],"burden":[68],"performing":[70],"many":[71],"costly":[72],"decryption":[73],"can":[75,152,183],"very":[77],"detrimental":[78],"performance.":[81],"This":[82,93,175],"paper":[83],"examines":[84],"promising":[86],"technique":[87,94],"for":[88,189],"re-balancing":[89],"RSA-based":[90],"client/server":[91],"handshakes.":[92],"facilitates":[95],"more":[96,105],"favorable":[97],"requiring":[101],"clients":[102],"perform":[104,114],"work":[106],"(as":[107],"encryption)":[110],"commensurately":[115],"less":[116],"work,":[117],"thus":[118],"resulting":[119],"better":[121],"throughput.":[123],"Proposed":[124],"techniques":[125,182],"are":[126],"based":[127],"on":[128,170],"careful":[129],"adaptation":[130],"variants":[132],"Server-Aided":[134],"RSA":[135,157,172],"originally":[136],"constructed":[137],"Matsumoto,":[139],"et":[140],"al.":[141],"[1].":[142],"Experimental":[143],"results":[144],"demonstrate":[145],"that":[146],"suggested":[147],"methods":[148],"(termed":[149],"Client-Aided":[150],"RSA)":[151],"speed":[153],"up":[154],"processing":[155],"private":[158],"key":[159,173],"factor":[163],"between":[165],"11":[166],"19,":[168],"depending":[169],"size.":[174],"represents":[176],"considerable":[178],"improvement.":[179],"Furthermore,":[180],"proposed":[181],"useful":[186],"companion":[187],"tool":[188],"Client":[191],"Puzzles":[192],"defense":[194],"against":[195],"DoS":[196],"DDoS":[198],"attacks.":[199]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":12}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
