Showing 1 - 20 results of 49 for search '"Secure Sockets Layer"', query time: 0.38s Refine Results
  1. 1

    Development and Evaluation of Secure Socket Layer Visualization Tool with Packet Capturing Function by Arai Masayuki

    Published 2015-01-01
    “…Secure Socket Layer (SSL) has become a fundamental technology that secures browser-processed personal details sent to the server. …”
    Get full text
    Article
  2. 2

    In depth analysis on secure socket layer-transport layer security (SSL-TLS) security flaws by Nan, Shi Yuan

    Published 2024
    “…In this paper, we explore the fundamental of Secure Socket Layer-Transport Layer Security (SSL-TLS) as well as looking through the past security flaws of SSL-TLS with examples of how various attacks manage to bypass SSL-TLS. …”
    Get full text
    Final Year Project (FYP)
  3. 3

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…Hashed Message Authentication Code (HMAC) is widely used to provide authenticity, while symmetric encryption algorithms provide confidentiality. Secure Socket Layer (SSL) is one of the most widely used security protocols on the Internet. …”
    Get full text
    Thesis
  4. 4
  5. 5

    Implementasi Secure Socket Layer Pada Aplikasi Computer Assisted Test Komisi Pemilihan Umum Bengkalis by Agus Tedyyana

    Published 2020-05-01
    Subjects: “…computer assisted test, secure socket layer…”
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    On the security of SSL/TLS-enabled applications by Manik Lal Das, Navkar Samdaria

    Published 2014-01-01
    Subjects: “…Secure Socket Layer…”
    Get full text
    Article
  11. 11
  12. 12

    QoE Assessment of Encrypted YouTube Adaptive Streaming for Energy Saving in Smart Cities by Wubin Pan, Guang Cheng

    Published 2018-01-01
    Subjects: “…Hyper text transfer protocol over secure socket layer (HTTPS) YouTube…”
    Get full text
    Article
  13. 13

    Speeding up secure web transactions using elliptic curve cryptography by Lim, Lai Koon.

    Published 2010
    “…This report documents the design and implementation of using ECC with Secure Sockets Layer (SSL), the dominant Internet security protocol. …”
    Get full text
    Final Year Project (FYP)
  14. 14

    SISTEMAS DE PAGO SEGURO. SEGURIDAD EN EL COMERCIO ELECTRÓNICO by Luis Martínez López, Francisco Mata Mata, Rosa María Rodríguez Domínguez

    Published 2009-06-01
    “…In this paper, we review the three main secure payment protocols in e-commerce, SSL (Secure Sockets Layer), SET (Secure Electronic Transaction) and 3D Secure, with the aim of removing any doubt about the lack of security in the electronic commercial transactions.…”
    Get full text
    Article
  15. 15

    PROTOCOLO DE SEGURIDAD SSL by Liusbetty Canino Gutiérrez, Sandra Ortega Martorell

    Published 2006-12-01
    “…Es necesario, por tanto, crear un entorno que garantice la autenticidad y seguridad de las transacciones que tienen lugar en este proceso. SSL (Secure Sockets Layer) es el protocolo de seguridad más estandarizado que, haciendo uso de un conjunto de técnicas criptográficas, asegura confidencialidad e integridad de la información.…”
    Get full text
    Article
  16. 16

    Key-Based Cookie-Less Session Management Framework for Application Layer Security by Zahoor Ahmed Alizai, Hasan Tahir, Malik Hamza Murtaza, Shahzaib Tahir, Klaus Mcdonald-Maier

    Published 2019-01-01
    “…The goal of this study is to extend the guarantees provided by the secure transmission protocols such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS) and apply them to the application layer. …”
    Get full text
    Article
  17. 17

    Mobile app identification for encrypted network flows by traffic correlation by Gaofeng He, Bingfeng Xu, Lu Zhang, Haiting Zhu

    Published 2018-12-01
    “…To address this challenge, we have carefully analyzed mobile app traffic (mainly including Domain Name System, Hypertext Transfer Protocol, and encrypted traffic such as Secure Sockets Layer and Transport Layer Security) and observed that (1) the sets of server hostnames queried by different apps are distinguishable; (2) mobile apps may query multiple server hostnames simultaneously, that is, apps may send several Domain Name System lookups within a short time interval; and (3) the encrypted traffic may be similar to various other network flows generated by the same app. …”
    Get full text
    Article
  18. 18

    SSL/TLS: analysis of Bleichenbacher's attack by Li, Jin Xuan

    Published 2024
    “…This report provides an analysis of the Bleichenbacher’s attack on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, which are crucial for secure internet communication. …”
    Get full text
    Final Year Project (FYP)
  19. 19

    Deep Learning Approach for Detecting Malicious Activities Over Encrypted Secure Channels by Jiwon Yang, Hyuk Lim

    Published 2021-01-01
    “…Traditional TCP/IP-level traffic inspections do not suffice in investigating a secure sockets layer (SSL) conversation because the SSL conversation data is encrypted by a public key system and the SSL uses its own data unit of an SSL record. …”
    Get full text
    Article
  20. 20

    “Back on Track”: A Mobile App Observational Study Using Apple’s ResearchKit Framework by Zens, Martin, Woias, Peter, Suedkamp, Norbert P, Niemeyer, Philipp

    Published 2017-02-01
    “…A secure server connection was realized via Secure Sockets Layer. A data storage and security concept separating personal information and study data was proposed. …”
    Get full text
    Article