Open Access
The Transport Layer Security (TLS) Protocol Version 1.1
Eric Rescorla
- Vol. 4346, pp 1-87
Reads0
Chats0
TLDR
This document specifies Version 1.1 of the Transport Layer Security (TLS) protocol, which provides communications security over the Internet by allowing client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 1.1 of the Transport Layer Security
(TLS) protocol. The TLS protocol provides communications security over
the Internet. The protocol allows client/server applications to
communicate in a way that is designed to prevent eavesdropping,
tampering, or message forgery. [STANDARDS-TRACK]read more
Citations
More filters
The OAuth 2.0 Authorization Framework
TL;DR: The OAuth 2.0 authorization framework replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849.
ReportDOI
The Transport Layer Security (TLS) Protocol Version 1.3
TL;DR: This document specifies version 1.3 of the Transport Layer Security (TLS) protocol, which allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.
Book
Computer Networking: A Top-Down Approach
James F. Kurose,Keith W. Ross +1 more
TL;DR: Computer Networking: A Top-Down Approach Featuring the Internet explains the engineering problems that are inherent in communicating digital information from point to point, and presents the mathematics that determine the best path, show some code that implements those algorithms, and illustrate the logic by using excellent conceptual diagrams.
Journal ArticleDOI
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
TL;DR: This survey analyzes existing protocols and mechanisms to secure communications in the IoT, as well as open research issues and analyzes the open challenges and strategies for future research work in the area.
Proceedings ArticleDOI
On Technical Security Issues in Cloud Computing
TL;DR: This paper focuses on technical security issues arising from the usage of Cloud services and especially by the underlying technologies used to build these cross-domain Internet-connected collaborations.
References
More filters
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Key words for use in RFCs to Indicate Requirement Levels
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
HMAC: Keyed-Hashing for Message Authentication
TL;DR: This document describes HMAC, a mechanism for message authentication using cryptographic hash functions that can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.
Clarifications to the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
TL;DR: This document updates the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, which is published in RFC 5280 and changes the set of acceptable encoding methods for the explicitText field of the user notice policy qualifier.
IP Authentication Header
S. Kent,R. Atkinson +1 more
TL;DR: This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6, and obsoletes RFC 2402 (November 1998).