scispace - formally typeset
Open Access

The Secure Sockets Layer (SSL) Protocol Version 3.0

Alan O. Freier, +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.
Abstract
This document specifies Version 3.0 of the Secure Sockets Layer (SSL V3.0) protocol, a security protocol that provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

read more

Citations
More filters
Patent

Systems and methods for secure operation of an industrial controller

TL;DR: In this paper, the authors proposed a method of securing an industrial control system, which includes exchanging security tokens between the plurality of devices of the industrial controller, and then ceasing operating the control system in the open mode and instead operating it in a secure mode.
Journal ArticleDOI

Enabling end-to-end secure communication between wireless sensor networks and the Internet

TL;DR: This paper proposes an end-to-end secure communication scheme for W2T in WSNs in which an asymmetric approach for authentication and key management using signcryption and symmetric key encryption is followed.
Proceedings ArticleDOI

Hunting Malicious TLS Certificates with Deep Neural Networks

TL;DR: This paper proposes a method for identifying malicious use of web certificates using deep neural networks that uses the content of TLS certificates to successfully identify legitimate certificates as well as malicious patterns used by attackers.
Proceedings ArticleDOI

A middlebox-cooperative TCP for a non end-to-end internet

TL;DR: TCP HICCUPS is developed to reveal packet header manipulation to both endpoints of a TCP connection and is implemented and deployed across thousands of disparate Internet paths, highlighting the breadth and scope of subtle and hard to detect middlebox behaviors encountered.
Journal ArticleDOI

CDTA: A Comprehensive Solution for Counterfeit Detection, Traceability, and Authentication in the IoT Supply Chain

TL;DR: A novel radio-frequency identification (RFID)-based system suitable for counterfeit detection, traceability, and authentication in the IoT supply chain called CDTA is developed, composed of different types of on-chip sensors and in-system structures that collect necessary information to detect multiple counterfeit IC types, track and trace IoT devices, and verify the overall system authenticity.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.

XDR: External Data Representation Standard

R. Srinivasan
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.