Keerthi et al., 2016 - Google Patents

Taxonomy of SSL/TLS attacks

Keerthi et al., 2016

Document ID
2907026530810836651
Author
Keerthi V
et al.
Publication year
Publication venue
International Journal of Computer Network and Information Security

External Links

Snippet

Abstract Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as …
Continue reading at search.proquest.com (other versions)

Similar Documents

Publication Publication Date Title
Bhargavan et al. Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS
Bhargavan et al. On the practical (in-) security of 64-bit block ciphers: Collision attacks on HTTP over TLS and OpenVPN
Sheffer et al. Summarizing known attacks on transport layer security (TLS) and datagram TLS (DTLS)
Lychev et al. How secure and quick is QUIC? Provable security and performance analyses
US9432340B1 (en) System and method for secure end-to-end chat system
Aiello et al. Just fast keying: Key agreement in a hostile internet
US7069438B2 (en) Establishing authenticated network connections
EP1692808A1 (en) Protected dynamic provisioning of credentials
Sirohi et al. A comprehensive study on security attacks on SSL/TLS protocol
WO2006091396A2 (en) Payload layer security for file transfer
Bhargavan et al. A formal treatment of accountable proxying over TLS
Alwazzeh et al. Man in the middle attacks against SSL/TLS: Mitigation and defeat
Chen et al. Secure communication channel establishment: TLS 1.3 (over TCP fast open) versus QUIC
Keerthi Taxonomy of SSL/TLS attacks
Jeanquier An Analysis of Port Knocking and Single Packet Authorization MSc Thesis
Baseri et al. Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols
Saverimoutou et al. Which secure transport protocol for a reliable HTTP/2-based web service: TLS or QUIC?
Shojaie et al. Enhancing EAP-TLS authentication protocol for IEEE 802.11 i
Liu et al. Extensible authentication protocols for IEEE standards 802.11 and 802.16
Moravčík et al. Survey of real-time multimedia security mechanisms
Limniotis et al. Cryptography threats
Schwenk Attacks on SSL and TLS
Hoeper et al. An inconvenient truth about tunneled authentications
Ganguly Network and application security: fundamentals and practices
Badra et al. Introducing smartcards to remote authenticate passwords using public key encryption