{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:02Z","timestamp":1750220522273,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,25]]},"DOI":"10.1145\/3407023.3407067","type":"proceedings-article","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T16:32:52Z","timestamp":1596126772000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Enhanced performance for the encrypted web through TLS resumption across hostnames"],"prefix":"10.1145","author":[{"given":"Erik","family":"Sy","sequence":"first","affiliation":[{"name":"University of Hamburg"}]},{"given":"Moritz","family":"Moennich","sequence":"additional","affiliation":[{"name":"University of Hamburg"}]},{"given":"Tobias","family":"Mueller","sequence":"additional","affiliation":[{"name":"University of Hamburg"}]},{"given":"Hannes","family":"Federrath","sequence":"additional","affiliation":[{"name":"University of Hamburg"}]},{"given":"Mathias","family":"Fischer","sequence":"additional","affiliation":[{"name":"University of Hamburg"}]}],"member":"320","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","author":"Alexa Internet Inc.","year":"2018","unstructured":"Alexa Internet Inc. 2018 . Alexa Top 1,000,000 Sites . Retrieved January 25, 2019 from http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip Alexa Internet Inc. 2018. Alexa Top 1,000,000 Sites. Retrieved January 25, 2019 from http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2637878"},{"key":"e_1_3_2_1_3_1","volume-title":"26th USENIX Security Symposium. 1323--1338","author":"Felt Adrienne Porter","year":"2017","unstructured":"Adrienne Porter Felt , Richard Barnes , April King , Chris Palmer , Chris Bentzel , and Parisa Tabriz . 2017 . Measuring HTTPS adoption on the web . In 26th USENIX Security Symposium. 1323--1338 . Adrienne Porter Felt, Richard Barnes, April King, Chris Palmer, Chris Bentzel, and Parisa Tabriz. 2017. Measuring HTTPS adoption on the web. In 26th USENIX Security Symposium. 1323--1338."},{"key":"e_1_3_2_1_4_1","volume-title":"Retrieved","author":"Grigorik Ilya","year":"2019","unstructured":"Ilya Grigorik . 2019 . TLS has exactly one performance problem: it is not used widely enough . Retrieved January 28, 2019 from https:\/\/istlsfastyet.com\/ Ilya Grigorik. 2019. TLS has exactly one performance problem: it is not used widely enough. Retrieved January 28, 2019 from https:\/\/istlsfastyet.com\/"},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved","author":"Archive HTTP","year":"2018","unstructured":"HTTP Archive . 2018 . Report: State of the Web . Retrieved January 25, 2019 from https:\/\/www.httparchive.org\/reports\/state-of-the-web HTTP Archive. 2018. Report: State of the Web. Retrieved January 25, 2019 from https:\/\/www.httparchive.org\/reports\/state-of-the-web"},{"key":"e_1_3_2_1_6_1","volume-title":"Retrieved","author":"Lin Zi","year":"2015","unstructured":"Zi Lin . 2015 . TLS Session Resumption: Full-speed and Secure . Retrieved January 17, 2019 from https:\/\/blog.cloudflare.com\/tls-session-resumption-full-speed-and-secure\/ Zi Lin. 2015. TLS Session Resumption: Full-speed and Secure. Retrieved January 17, 2019 from https:\/\/blog.cloudflare.com\/tls-session-resumption-full-speed-and-secure\/"},{"volume-title":"Retrieved Oktober 31","year":"2014","key":"e_1_3_2_1_7_1","unstructured":"OpenSignal. 2014 . LTE Latency: How does it compare to other technologies ? Retrieved Oktober 31 , 2018 from https:\/\/opensignal.com\/blog\/2014\/03\/10\/lte-latency-how-does-it-compare-to-other-technologies\/ OpenSignal. 2014. LTE Latency: How does it compare to other technologies? Retrieved Oktober 31, 2018 from https:\/\/opensignal.com\/blog\/2014\/03\/10\/lte-latency-how-does-it-compare-to-other-technologies\/"},{"volume-title":"Retrieved Oktober 31","year":"2018","key":"e_1_3_2_1_8_1","unstructured":"OpenSignal. 2018 . State of Mobile Networks: USA (July 2018) . Retrieved Oktober 31 , 2018 from https:\/\/opensignal.com\/reports\/2018\/07\/usa\/state-of-the-mobile-network OpenSignal. 2018. State of Mobile Networks: USA (July 2018). Retrieved Oktober 31, 2018 from https:\/\/opensignal.com\/reports\/2018\/07\/usa\/state-of-the-mobile-network"},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","author":"Software Foundation SSL","year":"2019","unstructured":"Open SSL Software Foundation . 2019 . Cryptography and SSL\/TLS Toolkit . Retrieved January 28, 2019 from https:\/\/www.openssl.org OpenSSL Software Foundation. 2019. Cryptography and SSL\/TLS Toolkit. Retrieved January 28, 2019 from https:\/\/www.openssl.org"},{"key":"e_1_3_2_1_10_1","volume-title":"Retrieved","author":"Projects The Chromium","year":"2019","unstructured":"The Chromium Projects . 2019 . BoringSSL - fork of OpenSSL that is designed to meet Google's needs . Retrieved January 28, 2019 from http:\/\/www.boringssl.com\/ The Chromium Projects. 2019. BoringSSL - fork of OpenSSL that is designed to meet Google's needs. Retrieved January 28, 2019 from http:\/\/www.boringssl.com\/"},{"key":"e_1_3_2_1_11_1","volume-title":"Retrieved","author":"wolfSSL Inc.","year":"2019","unstructured":"wolfSSL Inc. 2019 . Embedded TLS Library . Retrieved January 28, 2019 from https:\/\/www.wolfssl.com wolfSSL Inc. 2019. Embedded TLS Library. Retrieved January 28, 2019 from https:\/\/www.wolfssl.com"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987480"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274708"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC47392.2019.8958739"},{"key":"e_1_3_2_1_16_1","volume-title":"Retrieved","author":"wolfSSL Inc.","year":"2019","unstructured":"wolfSSL Inc. 2019 . Benchmarking wolfSSL and wolfCrypt . Retrieved January 16, 2019 from https:\/\/www.wolfssl.com\/docs\/benchmarks\/ wolfSSL Inc. 2019. Benchmarking wolfSSL and wolfCrypt. Retrieved January 16, 2019 from https:\/\/www.wolfssl.com\/docs\/benchmarks\/"}],"event":{"name":"ARES 2020: The 15th International Conference on Availability, Reliability and Security","acronym":"ARES 2020","location":"Virtual Event Ireland"},"container-title":["Proceedings of the 15th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3407067","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3407023.3407067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:42Z","timestamp":1750195482000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3407067"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,25]]},"references-count":16,"alternative-id":["10.1145\/3407023.3407067","10.1145\/3407023"],"URL":"https:\/\/doi.org\/10.1145\/3407023.3407067","relation":{},"subject":[],"published":{"date-parts":[[2020,8,25]]},"assertion":[{"value":"2020-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}