Open Access
The Secure Sockets Layer (SSL) Protocol Version 3.0
Alan O. Freier,Philip Karlton,Paul C. Kocher +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 3.0 of the Secure Sockets Layer (SSL
V3.0) protocol, a security protocol that provides communications
privacy over the Internet. The protocol allows client/server
applications to communicate in a way that is designed to prevent
eavesdropping, tampering, or message forgery.read more
Citations
More filters
Patent
Systems and methods for secure operation of an industrial controller
Justin Brandon Chong,David Richard Socky,Pavan Kumar Singh Thakur,William Robert Pettigrew,Robert James Boring +4 more
TL;DR: In this paper, the authors proposed a method of securing an industrial control system, which includes exchanging security tokens between the plurality of devices of the industrial controller, and then ceasing operating the control system in the open mode and instead operating it in a secure mode.
Journal ArticleDOI
Enabling end-to-end secure communication between wireless sensor networks and the Internet
TL;DR: This paper proposes an end-to-end secure communication scheme for W2T in WSNs in which an asymmetric approach for authentication and key management using signcryption and symmetric key encryption is followed.
Proceedings ArticleDOI
Hunting Malicious TLS Certificates with Deep Neural Networks
TL;DR: This paper proposes a method for identifying malicious use of web certificates using deep neural networks that uses the content of TLS certificates to successfully identify legitimate certificates as well as malicious patterns used by attackers.
Proceedings ArticleDOI
A middlebox-cooperative TCP for a non end-to-end internet
TL;DR: TCP HICCUPS is developed to reveal packet header manipulation to both endpoints of a TCP connection and is implemented and deployed across thousands of disparate Internet paths, highlighting the breadth and scope of subtle and hard to detect middlebox behaviors encountered.
Journal ArticleDOI
CDTA: A Comprehensive Solution for Counterfeit Detection, Traceability, and Authentication in the IoT Supply Chain
TL;DR: A novel radio-frequency identification (RFID)-based system suitable for counterfeit detection, traceability, and authentication in the IoT supply chain called CDTA is developed, composed of different types of on-chip sensors and in-system structures that collect necessary information to detect multiple counterfeit IC types, track and trace IoT devices, and verify the overall system authenticity.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
XDR: External Data Representation Standard
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.