scispace - formally typeset
Open Access

The Secure Sockets Layer (SSL) Protocol Version 3.0

Alan O. Freier, +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.
Abstract
This document specifies Version 3.0 of the Secure Sockets Layer (SSL V3.0) protocol, a security protocol that provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

read more

Citations
More filters

Non-functional requirements in publish/subscribe systems

TL;DR: This thesis proposes underlay-aware methods that explicitly take into account the properties of the underlying physical network and its topology, to construct an efficient publish/subscribe routing overlay with low relative delay penalty and low stress on the physical links.
Proceedings ArticleDOI

Which secure transport protocol for a reliable HTTP/2-based web service: TLS or QUIC?

TL;DR: This study can enable web servers developers or administrators to either select TLS/TCP or QUIC/UDP, and identifies the vulnerabilities of the two protocols and evaluates their impacts on HTTP/2-based web services.
Dissertation

A study of the TLS ecosystem

TL;DR: This thesis explored the SSL/TLS ecosystem at large using IPv4 HTTPS scans, while proposing collection and analysis methodologies to obtain reproducible and comparable results across different measurement campaigns, and focused on two key aspects of TLS security: how to mitigate Record Protocol attacks, and how to write safe and efficient parsers.
Proceedings ArticleDOI

BB-PKI: Blockchain-Based Public Key Infrastructure Certificate Management

TL;DR: A new Blockchain-Based PKI (BB-PKI) to address vulnerabilities of CA misbehaviour caused by impersonation attacks against RAs, which offers strong security guarantees, compromising $n - 1$ of the RAs or CAs is not enough to launch impersonating attacks, meaning that attackers cannot compromise more than the threshold of the latter signatures to launch an attack.
Proceedings ArticleDOI

Securing the internet through the detection of anonymous proxy usage

TL;DR: This research aims to identify the characteristics or signatures whenever a user is using a web proxy by developing a Detection System that records packets and analyses them looking for identifying patterns of web proxies.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.

XDR: External Data Representation Standard

R. Srinivasan
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.