scispace - formally typeset
Open Access

The Secure Sockets Layer (SSL) Protocol Version 3.0

Alan O. Freier, +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.
Abstract
This document specifies Version 3.0 of the Secure Sockets Layer (SSL V3.0) protocol, a security protocol that provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

read more

Citations
More filters
Journal ArticleDOI

A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification

TL;DR: Wang et al. as discussed by the authors designed a multimodal deep learning framework for encrypted traffic classification called PEAN, which uses the raw bytes and length sequence as the input, and uses the self-attention mechanism to learn the deep relationship among network packets in a biflow.
Journal ArticleDOI

A Combination Techniques of Intrusion Prevention and Detection for Cloud Computing

TL;DR: The Integrated Intrusion Prevention and Detection System (IIPDS) is proposed to prevent and detect different types of attacks to the infrastructure level of the cloud system to secure the communication between the cloud provider and the user.

Towards efficient and accountable oblivious cloud storage

Qiumao Ma
TL;DR: A large variety of schemes based on the oblivious RAM (ORAM) model have been proposed to allow a user to access the exported data while preserving user’s data access pattern, and the storage efficiency has not received much attention.
Journal ArticleDOI

Modifications of knuth randomness tests for integer and binary sequences

TL;DR: This work reviews the tests in Knuth Test Suite, gives test parameters in order for the tests to be applicable to integer and binary sequences and makes suggestions on the choice of these parameters.
Book ChapterDOI

Key Extraction Attack Using Statistical Analysis of Memory Dump Data

TL;DR: A key extraction technique is presented and its effectiveness is confirmed by implementing the Process Peeping Tool (PPT) – an analysis tool – that can dump the memory during the execution of a target program and help the attacker deduce the encryption keys through statistical analysis of the memory contents.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.

XDR: External Data Representation Standard

R. Srinivasan
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.