scispace - formally typeset
Open Access

The Secure Sockets Layer (SSL) Protocol Version 3.0

Alan O. Freier, +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.
Abstract
This document specifies Version 3.0 of the Secure Sockets Layer (SSL V3.0) protocol, a security protocol that provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

read more

Citations
More filters
Journal ArticleDOI

Bootstrap Analysis of Compression Algorithms

TL;DR: In this article, a statistical framework based on the bootstrap method was introduced to execute the analysis of compression algorithms using an objective comparison parameter as a criterion, and a case study using the compression ratio as the parameter and file samples of four different types was analyzed.
Proceedings ArticleDOI

Service Differentiation Strategy Based on User Demands for Https Web Servers

TL;DR: A service differentiation strategy for https web servers by proposing the adaptive goals cipher suite selection algorithm to meet the different demands for security and response time and improves the performance by the priority strategy based on scheduling period.
Dissertation

Improving the Security, Privacy, and Anonymity of a Client-Server Network through the Application of a Moving Target Defense

TL;DR: The work presented in this dissertation provides an extension to MT6D in order to support client/server networks that provide dynamically generated configurations, a secure and dynamic means of exchanging configurations, and with these new features, an ability to function as a server supporting a large number of clients.
Book ChapterDOI

PKI in Practice

TL;DR: This chapter presents applications that use public key cryptography and PKIs and in these applications both PGP- and X.509-based infrastructures can be used.
Posted Content

The 3D virtual environment online for real shopping

TL;DR: This paper presents a new type of e-commerce system, which obviously brings virtual environment online with an active 3D model that allows consumers to access products into real physical environments for user interaction and helps customers make better purchasing decisions.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.

XDR: External Data Representation Standard

R. Srinivasan
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.