scispace - formally typeset
Open Access

The Secure Sockets Layer (SSL) Protocol Version 3.0

Alan O. Freier, +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.
Abstract
This document specifies Version 3.0 of the Secure Sockets Layer (SSL V3.0) protocol, a security protocol that provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

read more

Citations
More filters
Proceedings ArticleDOI

Applying a single sign-on algorithm based on cloud computing concepts for SaaS applications

TL;DR: A cloud-based single sign-on model for reliable accessing to cloud computing software-as-a-service applications is offered and the theoretical security analysis shows that the algorithm is enough reliable for establishing secure connections between SaaS application service providers and users.
Proceedings ArticleDOI

SADT: syntax-aware differential testing of certificate validation in SSL/TLS implementations

TL;DR: SADT as mentioned in this paper is a syntax-aware differential testing framework for evaluating the certificate validation process in SSL/TLS implementations, which uses a tree-based mutation strategy to ensure that the generated certificates are syntactically correct, and then diversify the certificates by sharing interesting test cases among all target TLS implementations.
Posted Content

A realtime key recovery attack on the authenticated cipher FASER128.

TL;DR: This work presents a key recovery attack to FASER128, which needs at most 64 key words and is realtime in a PC, and shows that FASer128 is very insecure.
Proceedings ArticleDOI

Machine Learning Classification on Traffic of Secondary Encryption

TL;DR: This paper takes as an example of the web browsing application, and proposes a machine learning classification scheme, Bali, that can identify the encrypted traffic from various websites, and employs packet length statistics as discriminative features of encrypted traffic.
Journal ArticleDOI

Cloud computing mobile application for remote monitoring of Bell's palsy

TL;DR: The Facial Remote Activity Monitoring Eyewear (FRAME) mobile application and web service framework has been designed to work on the IOS and android platforms, the two most commonly used today.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.

XDR: External Data Representation Standard

R. Srinivasan
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.