Open Access
The Secure Sockets Layer (SSL) Protocol Version 3.0
Alan O. Freier,Philip Karlton,Paul C. Kocher +2 more
- Vol. 6101, pp 1-67
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 3.0 of the Secure Sockets Layer (SSL
V3.0) protocol, a security protocol that provides communications
privacy over the Internet. The protocol allows client/server
applications to communicate in a way that is designed to prevent
eavesdropping, tampering, or message forgery.read more
Citations
More filters
Journal ArticleDOI
Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams
TL;DR: An attribute-aware encrypted traffic classification method based on the second-order Markov Chains is proposed, which can improve the classification accuracy by 29% on the average compared with the state-of-the-art Markov-based method.
Journal ArticleDOI
Embedding Blockchain Technology Into IoT for Security: A Survey
TL;DR: This article systematically analyzes state of the art of IoT security based on the blockchain, paying special attention to the security features, issues, technologies, approaches, and related scenarios in blockchain-embedded IoT.
Proceedings ArticleDOI
TLS in the wild: an internet-wide analysis of TLS-based protocols for electronic communication
TL;DR: This is the largest study to date that investigates the security of the email and chat infrastructures, using active Internet-wide scans to determine the amount of secure service deployments, and passive monitoring to investigate if user agents actually use this opportunity to secure their communications.
Proceedings ArticleDOI
Upgrading HTTPS in Mid-Air: An Empirical Study of Strict Transport Security and Key Pinning
Michael J. Kranch,Joseph Bonneau +1 more
TL;DR: The first in-depth empirical study of two important new web security features: strict transport security (HSTS) and public-key pinning is conducted, finding evidence that many developers do not completely understand these features, with a substantial portion using them in invalid or illogical ways.
Proceedings ArticleDOI
NEZHA: Efficient Domain-Independent Differential Testing
TL;DR: The notion of δ-diversity is introduced, which summarizes the observed asymmetries between the behaviors of multiple test applications, and two efficient domain-independent input generation mechanisms for differential testing, one gray-box and one black-box are designed.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
XDR: External Data Representation Standard
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.