scispace - formally typeset
Open Access

The Secure Sockets Layer (SSL) Protocol Version 3.0

Alan O. Freier, +2 more
- Vol. 6101, pp 1-67
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.
Abstract
This document specifies Version 3.0 of the Secure Sockets Layer (SSL V3.0) protocol, a security protocol that provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

read more

Citations
More filters
Journal ArticleDOI

Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams

TL;DR: An attribute-aware encrypted traffic classification method based on the second-order Markov Chains is proposed, which can improve the classification accuracy by 29% on the average compared with the state-of-the-art Markov-based method.
Journal ArticleDOI

Embedding Blockchain Technology Into IoT for Security: A Survey

TL;DR: This article systematically analyzes state of the art of IoT security based on the blockchain, paying special attention to the security features, issues, technologies, approaches, and related scenarios in blockchain-embedded IoT.
Proceedings ArticleDOI

TLS in the wild: an internet-wide analysis of TLS-based protocols for electronic communication

TL;DR: This is the largest study to date that investigates the security of the email and chat infrastructures, using active Internet-wide scans to determine the amount of secure service deployments, and passive monitoring to investigate if user agents actually use this opportunity to secure their communications.
Proceedings ArticleDOI

Upgrading HTTPS in Mid-Air: An Empirical Study of Strict Transport Security and Key Pinning

TL;DR: The first in-depth empirical study of two important new web security features: strict transport security (HSTS) and public-key pinning is conducted, finding evidence that many developers do not completely understand these features, with a substantial portion using them in invalid or illogical ways.
Proceedings ArticleDOI

NEZHA: Efficient Domain-Independent Differential Testing

TL;DR: The notion of δ-diversity is introduced, which summarizes the observed asymmetries between the behaviors of multiple test applications, and two efficient domain-independent input generation mechanisms for differential testing, one gray-box and one black-box are designed.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.

XDR: External Data Representation Standard

R. Srinivasan
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.