-
1
Development and Evaluation of Secure Socket Layer Visualization Tool with Packet Capturing Function
Published 2015-01-01“…Secure Socket Layer (SSL) has become a fundamental technology that secures browser-processed personal details sent to the server. …”
Get full text
Article -
2
In depth analysis on secure socket layer-transport layer security (SSL-TLS) security flaws
Published 2024“…In this paper, we explore the fundamental of Secure Socket Layer-Transport Layer Security (SSL-TLS) as well as looking through the past security flaws of SSL-TLS with examples of how various attacks manage to bypass SSL-TLS. …”
Get full text
Final Year Project (FYP) -
3
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Hashed Message Authentication Code (HMAC) is widely used to provide authenticity, while symmetric encryption algorithms provide confidentiality. Secure Socket Layer (SSL) is one of the most widely used security protocols on the Internet. …”
Get full text
Thesis -
4
Modeling Analysis of SM2 Construction Attacks in the Open Secure Sockets Layer Based on Petri Net
Published 2022-02-01Get full text
Article -
5
Implementasi Secure Socket Layer Pada Aplikasi Computer Assisted Test Komisi Pemilihan Umum Bengkalis
Published 2020-05-01Subjects: “…computer assisted test, secure socket layer…”
Get full text
Article -
6
-
7
Security analysis of mobile crowd sensing applications
Published 2022-03-01Subjects: Get full text
Article -
8
Providing A Secure Environment For E-Commerce Sites Using SSL Technology
Published 2020-03-01Subjects: Get full text
Article -
9
Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity
Published 2018-12-01Subjects: Get full text
Article -
10
On the security of SSL/TLS-enabled applications
Published 2014-01-01Subjects: “…Secure Socket Layer…”
Get full text
Article -
11
Iotverif: Automatic Verification of SSL/TLS Certificate for IoT Applications
Published 2021-01-01Subjects: Get full text
Article -
12
QoE Assessment of Encrypted YouTube Adaptive Streaming for Energy Saving in Smart Cities
Published 2018-01-01Subjects: “…Hyper text transfer protocol over secure socket layer (HTTPS) YouTube…”
Get full text
Article -
13
Speeding up secure web transactions using elliptic curve cryptography
Published 2010“…This report documents the design and implementation of using ECC with Secure Sockets Layer (SSL), the dominant Internet security protocol. …”
Get full text
Final Year Project (FYP) -
14
SISTEMAS DE PAGO SEGURO. SEGURIDAD EN EL COMERCIO ELECTRÓNICO
Published 2009-06-01“…In this paper, we review the three main secure payment protocols in e-commerce, SSL (Secure Sockets Layer), SET (Secure Electronic Transaction) and 3D Secure, with the aim of removing any doubt about the lack of security in the electronic commercial transactions.…”
Get full text
Article -
15
PROTOCOLO DE SEGURIDAD SSL
Published 2006-12-01“…Es necesario, por tanto, crear un entorno que garantice la autenticidad y seguridad de las transacciones que tienen lugar en este proceso. SSL (Secure Sockets Layer) es el protocolo de seguridad más estandarizado que, haciendo uso de un conjunto de técnicas criptográficas, asegura confidencialidad e integridad de la información.…”
Get full text
Article -
16
Key-Based Cookie-Less Session Management Framework for Application Layer Security
Published 2019-01-01“…The goal of this study is to extend the guarantees provided by the secure transmission protocols such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS) and apply them to the application layer. …”
Get full text
Article -
17
Mobile app identification for encrypted network flows by traffic correlation
Published 2018-12-01“…To address this challenge, we have carefully analyzed mobile app traffic (mainly including Domain Name System, Hypertext Transfer Protocol, and encrypted traffic such as Secure Sockets Layer and Transport Layer Security) and observed that (1) the sets of server hostnames queried by different apps are distinguishable; (2) mobile apps may query multiple server hostnames simultaneously, that is, apps may send several Domain Name System lookups within a short time interval; and (3) the encrypted traffic may be similar to various other network flows generated by the same app. …”
Get full text
Article -
18
SSL/TLS: analysis of Bleichenbacher's attack
Published 2024“…This report provides an analysis of the Bleichenbacher’s attack on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, which are crucial for secure internet communication. …”
Get full text
Final Year Project (FYP) -
19
Deep Learning Approach for Detecting Malicious Activities Over Encrypted Secure Channels
Published 2021-01-01“…Traditional TCP/IP-level traffic inspections do not suffice in investigating a secure sockets layer (SSL) conversation because the SSL conversation data is encrypted by a public key system and the SSL uses its own data unit of an SSL record. …”
Get full text
Article -
20
“Back on Track”: A Mobile App Observational Study Using Apple’s ResearchKit Framework
Published 2017-02-01“…A secure server connection was realized via Secure Sockets Layer. A data storage and security concept separating personal information and study data was proposed. …”
Get full text
Article