Open Access
The Secure Sockets Layer (SSL) Protocol Version 3.0
Alan O. Freier,Philip Karlton,Paul C. Kocher +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 3.0 of the Secure Sockets Layer (SSL
V3.0) protocol, a security protocol that provides communications
privacy over the Internet. The protocol allows client/server
applications to communicate in a way that is designed to prevent
eavesdropping, tampering, or message forgery.read more
Citations
More filters
Proceedings ArticleDOI
A simple text-based shoulder surfing resistant graphical password scheme
TL;DR: This paper proposes an improved text-based shoulder surfing resistant graphical password scheme by using colors, and shows the resistance of the proposed scheme to shoulder surfing and accidental login.
Journal ArticleDOI
Feature analysis of encrypted malicious traffic
TL;DR: This paper applies three machine learning techniques to the problem of distinguishing malicious encrypted HTTP traffic from benign encrypted traffic and obtains results comparable to previous work, and argues that such a machine learning based approach to feature analysis is preferable, as it is more reliable, and can, for example, uncover relatively unintuitive interactions between features.
Proceedings ArticleDOI
On the security of TLS renegotiation
TL;DR: It is shown generically that the proposed fixes for TLS offer good protection against renegotiation attacks, and a simple new countermeasure is given that provides renegotiation security for TLS even in the face of stronger adversaries.
TLS Fallback Signaling Cipher Suite Value (SCSV) for Preventing Protocol Downgrade Attacks
Bodo Moeller,Adam Langley +1 more
TL;DR: This document defines a Signaling Cipher Suite Value (SCSV) that prevents protocol downgrade attacks on the Transport Layer Security (TLS) and Datagram Transport Layer security (DTLS) protocols.
Journal ArticleDOI
The PREEMPT study - evaluating smartphone-assisted n-of-1 trials in patients with chronic pain: study protocol for a randomized controlled trial
Colin Barr,Maria Marois,Ida Sim,Christopher H. Schmid,Barth Wilsey,Deborah Ward,Naihua Duan,Ron D. Hays,Joshua Selsky,Joseph L. Servadio,Marc Schwartz,Clyde Dsouza,Navjot Dhammi,Zachary B. Holt,Victor H. Baquero,Scott MacDonald,Anthony F Jerant,Ron V. Sprinkle,Richard L. Kravitz +18 more
TL;DR: The goal of the PREEMPT study is to test the ‘Trialist’ mobile health smartphone app, which has been developed to make n-of-1 trials easier to accomplish, and to provide patients and clinicians with tools for individualizing treatments for chronic pain.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
XDR: External Data Representation Standard
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.