Open Access
The Secure Sockets Layer (SSL) Protocol Version 3.0
Alan O. Freier,Philip Karlton,Paul C. Kocher +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 3.0 of the Secure Sockets Layer (SSL
V3.0) protocol, a security protocol that provides communications
privacy over the Internet. The protocol allows client/server
applications to communicate in a way that is designed to prevent
eavesdropping, tampering, or message forgery.read more
Citations
More filters
Proceedings ArticleDOI
Applying a single sign-on algorithm based on cloud computing concepts for SaaS applications
TL;DR: A cloud-based single sign-on model for reliable accessing to cloud computing software-as-a-service applications is offered and the theoretical security analysis shows that the algorithm is enough reliable for establishing secure connections between SaaS application service providers and users.
Proceedings ArticleDOI
SADT: syntax-aware differential testing of certificate validation in SSL/TLS implementations
TL;DR: SADT as mentioned in this paper is a syntax-aware differential testing framework for evaluating the certificate validation process in SSL/TLS implementations, which uses a tree-based mutation strategy to ensure that the generated certificates are syntactically correct, and then diversify the certificates by sharing interesting test cases among all target TLS implementations.
Posted Content
A realtime key recovery attack on the authenticated cipher FASER128.
Xiutao Feng,Fan Zhang +1 more
TL;DR: This work presents a key recovery attack to FASER128, which needs at most 64 key words and is realtime in a PC, and shows that FASer128 is very insecure.
Proceedings ArticleDOI
Machine Learning Classification on Traffic of Secondary Encryption
TL;DR: This paper takes as an example of the web browsing application, and proposes a machine learning classification scheme, Bali, that can identify the encrypted traffic from various websites, and employs packet length statistics as discriminative features of encrypted traffic.
Journal ArticleDOI
Cloud computing mobile application for remote monitoring of Bell's palsy
TL;DR: The Facial Remote Activity Monitoring Eyewear (FRAME) mobile application and web service framework has been designed to work on the IOS and android platforms, the two most commonly used today.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
XDR: External Data Representation Standard
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.