Open Access
The Secure Sockets Layer (SSL) Protocol Version 3.0
Alan O. Freier,Philip Karlton,Paul C. Kocher +2 more
- Vol. 6101, pp 1-67
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 3.0 of the Secure Sockets Layer (SSL
V3.0) protocol, a security protocol that provides communications
privacy over the Internet. The protocol allows client/server
applications to communicate in a way that is designed to prevent
eavesdropping, tampering, or message forgery.read more
Citations
More filters
Journal ArticleDOI
O čitelnosti příloh datových zpráv v PDF na platformě OS X
TL;DR: Navrhu takove informacniho systemu je nutne věnovat patřicnou peci i vzhledem k tomu, že pokud by se v navrhu později objevila trhlina, mohla by mit nedozirne nasledky na vsechny uživatele.
Networking for Smart Meters
TL;DR: The Smart Grid as mentioned in this paper is a class of technology bringing electricity delivery systems into the 21st century, using computer-based remote control and automation, which is referred to as "Smart Grid" technology.
Dissertation
Yamen cryptosystem : an enhanced RSA by using Rabin algorithm and Huffman coding
TL;DR: A swift and secure variant of RSA based on Rabin and Huffman coding called Yamen cryptosystem is designed and implemented to solve aforementioned limitations of the basic RSA and makes RSA semantically secure.
Proceedings ArticleDOI
KPaM: A Key Protection Framework for Mobile Devices Based on Two-party Computation
TL;DR: KPaM, a low-cost and flexible key protection framework for mobile devices, which can mitigate the issues described above, and takes SM2 algorithm as an example to validate KPaM and evaluate its security and efficiency.
Book ChapterDOI
Towards Privacy Awareness in Future Internet Technologies
Hosnieh Rafiee,Christoph Meinel +1 more
TL;DR: The purpose of this chapter is to discuss the best balance between users' expectation and the practical level of privacy to address user privacy needs and evaluate the most important protocols from privacy aspects.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
XDR: External Data Representation Standard
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.