Search
Search Results
-
TLS – Transport Layer Security Protocol
Das Transport Layer Security (TLS) Protocol ist ein Protokoll zur Authentifizierung, Verschlüsselung und Integritätssicherung, das vor allem in der... -
Transport Layer Security (TLS)/Secure Socket Layer (SSL)
Im Kapitel „Transport Layer Security (TLS)/Secure Socket Layer (SSL) – TLS/SSL“ werden die Cyber-Sicherheitsarchitektur, Cyber-Sicherheitsprinzipien,... -
Transport Layer Security
At the time of writing, TLS version 1.2 is the only version supported by all websites. This is one of the reasons why we chose version 1.2 for a... -
Machine learning models for phishing detection from TLS traffic
Phishing is a fraudulent tactic for attackers to obtain victims personal information, such as passwords, account details, credit card details, and...
-
TLS Goes Low Cost: When TLS Meets Edge
Recently, we have witnessed an upward trend in adopting the Transport Layer Security version 1.3 (TLS 1.3) to numerous applications (Google Cloud... -
RATLS: Integrating Transport Layer Security with Remote Attestation
We present RATLS, a companion library for OpenSSL that integrates the Trusted Computing concept of Remote Attestation into Transport Layer Security... -
Encryption In Transit Using Transport Layer Security
In this chapter we discuss using Transport Layer Security (TLS) to encrypt data in transit. When we talk about encryption in transit, we are talking... -
Telemedical transport layer security based platform for cardiac arrhythmia classification using quadratic time–frequency analysis of HRV signal
The heart rate variability signal is a valuable tool for cardiovascular system diagnostics. Processing this signal detects arrhythmia during...
-
SSL and TLS
SSL (Secure Sockets Layer) was created by Netscape Communications to secure web traffic with cryptography and PKI. It became so valuable and widely... -
A Framework for Dynamic Configuration of TLS Connections Based on Standards
The Transport Layer Security (TLS) protocol is widely used for protecting end-to-end communications between network peers (applications or nodes)....
-
DissecTLS: A Scalable Active Scanner for TLS Server Configurations, Capabilities, and TLS Fingerprinting
Collecting metadata from Transport Layer Security (TLS) servers on a large scale allows to draw conclusions about their capabilities and... -
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)
The Internet of Things (IoT) plays a fundamental role in contemporary society, necessitating an in-depth comprehension of its application layer...
-
Key-Schedule Security for the TLS 1.3 Standard
Transport Layer Security (TLS) is the cryptographic backbone of secure communication on the Internet. In its latest version 1.3, the standardization... -
mdTLS: How to Make Middlebox-Aware TLS More Efficient?
Recently, many organizations have been installing middleboxes in their networks in large numbers to provide various services to their customers.... -
Analysis of TLS Prefiltering for IDS Acceleration
Network intrusion detection systems (IDS) and intrusion prevention systems (IPS) have proven to play a key role in securing networks. However, due to... -
Computer Network Security Protocols
The rapid growth of the Internet and corresponding Internet community has fueled the rapid growth of both individual and business communications... -
Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal
Transport Layer Security (TLS) 1.3 and the Signal protocol are very important and widely used security protocols. We show that the key update... -
Machine Learning-Based Malware Detection and Classification in Encrypted TLS Traffic
Malware has become a significant threat to Internet users in the modern digital era. Malware spreads quickly and poses a significant threat to cyber... -
Exploring the Evolution of TLS Certificates
A vast majority of popular communication protocols such as HTTPS for the Internet employs the use of TLS (Transport Layer Security) to secure... -
A Framework for TLS Implementation Vulnerability Testing in 5G
A 5G TLS implementation vulnerability testing framework is proposed. By constructing a TLS vulnerability database using the public TLS security...