Open Access
The Secure Sockets Layer (SSL) Protocol Version 3.0
Alan O. Freier,Philip Karlton,Paul C. Kocher +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 3.0 of the Secure Sockets Layer (SSL
V3.0) protocol, a security protocol that provides communications
privacy over the Internet. The protocol allows client/server
applications to communicate in a way that is designed to prevent
eavesdropping, tampering, or message forgery.read more
Citations
More filters
Journal ArticleDOI
Planning security architecture for health survey data storage and access
M. Rita Thissen,Katherine Mason +1 more
TL;DR: Attention is drawn to basic data security needs for health survey data from the perspective of both the health researcher/practitioner and infrastructure/programming staff to ensure that data are securely and adequately protected.
Journal ArticleDOI
TALK: Topology Aware LKH Key Management
TL;DR: This work proposes a method for obtaining LKH structures by taking into account the topology of the underlying network, leading to a further decrease in rekeying costs, in terms of packet transmissions.
DissertationDOI
Data access pattern protection in cloud storage
TL;DR: Oblivious RAMs (ORAM) have been proposed to allow a user to access the exported data while preserving user’s data access pattern, and the practicality of the existing ORAM constructions is still questionable.
Proceedings ArticleDOI
Software support for self-service automated systems
TL;DR: This paper describes software support for the NS Bike bicycle renting system and describes the importance of the service provided by the self-service automated system to the user.
Proceedings ArticleDOI
Unveiling SSL/TLS MITM Hosts in the Wild
Zhen Li,Gang Xiong,Li Guo +2 more
TL;DR: This work designs and implements a novel method to discovery suspicious SSL MITM hosts in the wild and shows that hosts using untrusted certificates are vulnerable to MITM attacks.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
XDR: External Data Representation Standard
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.