Open Access
The Secure Sockets Layer (SSL) Protocol Version 3.0
Alan O. Freier,Philip Karlton,Paul C. Kocher +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 3.0 of the Secure Sockets Layer (SSL
V3.0) protocol, a security protocol that provides communications
privacy over the Internet. The protocol allows client/server
applications to communicate in a way that is designed to prevent
eavesdropping, tampering, or message forgery.read more
Citations
More filters
Proceedings ArticleDOI
An efficient privacy protection solution for smart home application platform
TL;DR: The proposed solution using public key cryptography uses a self-built CA to provide digital certificate to each user and smart home controller, and uses the SSL mutual authentication to verify the identity of user andsmart home controller.
Proceedings ArticleDOI
S-ORAM: a segmentation-based oblivious RAM
TL;DR: In this article, a segmentation-based ORAM (S-ORAM) is proposed to improve the performance of shuffling and query by factoring block size into design.
Posted ContentDOI
HTTP Mailbox - Asynchronous RESTful Communication
TL;DR: This work describes HTTP Mailbox, a mechanism to enable RESTful HTTP communication in an asynchronous mode with a full range of HTTP methods otherwise unavailable to standard clients and servers and demonstrates the implementation in a human assisted web preservation application called "Preserve Me".
Proceedings ArticleDOI
Certification with Multiple Signatures
Xinli Wang,Yan Bai,Lihui Hu +2 more
TL;DR: An alternative approach to mitigate the issue of CA breaches by imposing multiple signatures on a server certificate, analogous with the redundancy approach that is commonly adopted in the practice of IT management.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
XDR: External Data Representation Standard
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.