Keerthi et al., 2016 - Google Patents
Taxonomy of SSL/TLS attacksKeerthi et al., 2016
- Document ID
- 2907026530810836651
- Author
- Keerthi V
- et al.
- Publication year
- Publication venue
- International Journal of Computer Network and Information Security
External Links
Snippet
Abstract Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as …
- 235000010956 sodium stearoyl-2-lactylate 0 title 1
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhargavan et al. | Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS | |
Bhargavan et al. | On the practical (in-) security of 64-bit block ciphers: Collision attacks on HTTP over TLS and OpenVPN | |
Sheffer et al. | Summarizing known attacks on transport layer security (TLS) and datagram TLS (DTLS) | |
Lychev et al. | How secure and quick is QUIC? Provable security and performance analyses | |
US9432340B1 (en) | System and method for secure end-to-end chat system | |
Aiello et al. | Just fast keying: Key agreement in a hostile internet | |
US7069438B2 (en) | Establishing authenticated network connections | |
EP1692808A1 (en) | Protected dynamic provisioning of credentials | |
Sirohi et al. | A comprehensive study on security attacks on SSL/TLS protocol | |
WO2006091396A2 (en) | Payload layer security for file transfer | |
Bhargavan et al. | A formal treatment of accountable proxying over TLS | |
Alwazzeh et al. | Man in the middle attacks against SSL/TLS: Mitigation and defeat | |
Chen et al. | Secure communication channel establishment: TLS 1.3 (over TCP fast open) versus QUIC | |
Keerthi | Taxonomy of SSL/TLS attacks | |
Jeanquier | An Analysis of Port Knocking and Single Packet Authorization MSc Thesis | |
Baseri et al. | Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols | |
Saverimoutou et al. | Which secure transport protocol for a reliable HTTP/2-based web service: TLS or QUIC? | |
Shojaie et al. | Enhancing EAP-TLS authentication protocol for IEEE 802.11 i | |
Liu et al. | Extensible authentication protocols for IEEE standards 802.11 and 802.16 | |
Moravčík et al. | Survey of real-time multimedia security mechanisms | |
Limniotis et al. | Cryptography threats | |
Schwenk | Attacks on SSL and TLS | |
Hoeper et al. | An inconvenient truth about tunneled authentications | |
Ganguly | Network and application security: fundamentals and practices | |
Badra et al. | Introducing smartcards to remote authenticate passwords using public key encryption |