scispace - formally typeset
Open Access

The Secure Sockets Layer (SSL) Protocol Version 3.0

Alan O. Freier, +2 more
- Vol. 6101, pp 1-67
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.
Abstract
This document specifies Version 3.0 of the Secure Sockets Layer (SSL V3.0) protocol, a security protocol that provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

read more

Citations
More filters

Automated grid fault detection and repair

Leslie Luyt
TL;DR: This work proposes a novel system to perform automated monitoring and repair of grid systems and shows that certain faults can be easily detected and repaired.
Dissertation

Analyzing TLS Interception in Middleware Network Appliances

Louis Waked
TL;DR: The goal is to highlight the risks introduced by widely-used TLS proxies in enterprise and government environments, potentially affecting many systems hosting security, privacy, and financially sensitive data.
Proceedings ArticleDOI

Protective and efficacious cloud evaluating schema

TL;DR: An introduction to cloud computational schema which differentiates information reckoning on significant properties and helps debasing the process charges and complicatedness of information storage.
Journal ArticleDOI

Modeling and Analysis of Cloud Collaborative Commerce

TL;DR: This paper describes and evaluates the performance of a new model of c-commerce that utilizes the evolving cloud computing technologies and demonstrates that the cc-commerce model performs faster than equivalent ccommerce models.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.

XDR: External Data Representation Standard

R. Srinivasan
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.