Open Access
The Secure Sockets Layer (SSL) Protocol Version 3.0
Alan O. Freier,Philip Karlton,Paul C. Kocher +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 3.0 of the Secure Sockets Layer (SSL
V3.0) protocol, a security protocol that provides communications
privacy over the Internet. The protocol allows client/server
applications to communicate in a way that is designed to prevent
eavesdropping, tampering, or message forgery.read more
Citations
More filters
Non-functional requirements in publish/subscribe systems
TL;DR: This thesis proposes underlay-aware methods that explicitly take into account the properties of the underlying physical network and its topology, to construct an efficient publish/subscribe routing overlay with low relative delay penalty and low stress on the physical links.
Proceedings ArticleDOI
Which secure transport protocol for a reliable HTTP/2-based web service: TLS or QUIC?
TL;DR: This study can enable web servers developers or administrators to either select TLS/TCP or QUIC/UDP, and identifies the vulnerabilities of the two protocols and evaluates their impacts on HTTP/2-based web services.
Dissertation
A study of the TLS ecosystem
TL;DR: This thesis explored the SSL/TLS ecosystem at large using IPv4 HTTPS scans, while proposing collection and analysis methodologies to obtain reproducible and comparable results across different measurement campaigns, and focused on two key aspects of TLS security: how to mitigate Record Protocol attacks, and how to write safe and efficient parsers.
Proceedings ArticleDOI
BB-PKI: Blockchain-Based Public Key Infrastructure Certificate Management
TL;DR: A new Blockchain-Based PKI (BB-PKI) to address vulnerabilities of CA misbehaviour caused by impersonation attacks against RAs, which offers strong security guarantees, compromising $n - 1$ of the RAs or CAs is not enough to launch impersonating attacks, meaning that attackers cannot compromise more than the threshold of the latter signatures to launch an attack.
Proceedings ArticleDOI
Securing the internet through the detection of anonymous proxy usage
TL;DR: This research aims to identify the characteristics or signatures whenever a user is using a web proxy by developing a Detection System that records packets and analyses them looking for identifying patterns of web proxies.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
XDR: External Data Representation Standard
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.