Academic literature on the topic 'Certificats SSL/TLS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Certificats SSL/TLS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Certificats SSL/TLS"
Lapshichyov, Vitaly V. "TLS Certificates of the Tor Network and Their Distinctive Features." International Journal of Systems and Software Security and Protection 10, no. 2 (July 2019): 20–43. http://dx.doi.org/10.4018/ijsssp.2019070102.
Full textFoppe, Lucas, Jeremy Martin, Travis Mayberry, Erik C. Rye, and Lamont Brown. "Exploiting TLS Client Authentication for Widespread User Tracking." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (October 1, 2018): 51–63. http://dx.doi.org/10.1515/popets-2018-0031.
Full textPark, Jun-Cheol. "Cookie-Based Identification of the Public Keys of TLS/SSL Certificates." Journal of Korean Institute of Communications and Information Sciences 41, no. 1 (January 31, 2016): 101–3. http://dx.doi.org/10.7840/kics.2015.41.1.101.
Full textCueva Hurtado, Mario E., and Diego Javier Alvarado Sarango. "Análisis de Certificados SSL/TLS gratuitos y su implementación como Mecanismo de seguridad en Servidores de Aplicación." Enfoque UTE 8, no. 1 (February 24, 2017): 273–86. http://dx.doi.org/10.29019/enfoqueute.v8n1.128.
Full textLapshichyov, Vitaly V., and Oleg B. Makarevich. "Detection and identification method of the tor bundle use." Informatization and communication, no. 3 (May 5, 2020): 17–20. http://dx.doi.org/10.34219/2078-8320-2020-11-3-17-20.
Full textTian, Cong, Chu Chen, Zhenhua Duan, and Liang Zhao. "Differential Testing of Certificate Validation in SSL/TLS Implementations." ACM Transactions on Software Engineering and Methodology 28, no. 4 (October 12, 2019): 1–37. http://dx.doi.org/10.1145/3355048.
Full textMartynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.
Full textWang, Yingjie, Guangquan Xu, Xing Liu, Weixuan Mao, Chengxiang Si, Witold Pedrycz, and Wei Wang. "Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis." Journal of Systems and Software 167 (September 2020): 110609. http://dx.doi.org/10.1016/j.jss.2020.110609.
Full textLapshichyov, Vitaly, and Oleg Makarevich. "Method for Detecting and Identification of Tor Network Data by Wireshark Analyzer." Voprosy kiberbezopasnosti, no. 4(44) (2021): 73–80. http://dx.doi.org/10.21681/2311-3456-2021-4-73-80.
Full textAsratian, R. E. "Secure Network Channel for Web Services based on SSL/TLS Technology in a Linux Environment." Programmnaya Ingeneria 13, no. 3 (March 23, 2022): 124–31. http://dx.doi.org/10.17587/prin.13.124-131.
Full textDissertations / Theses on the topic "Certificats SSL/TLS"
Traore, Mohamed. "Analyse des biais de RNG pour les mécanismes cryptographiques et applications industrielles." Thesis, Université Grenoble Alpes, 2022. http://www.theses.fr/2022GRALM013.
Full textIn this work, we analyze X.509 SSL/TLS certificates (using RSA encryption and from hundreds of millions of connected devices) looking for anomalies and notably extend the work of Hastings, Fried and Heninger (2016). Our study was carried out on three databases from EFF (2010-2011), ANSSI (2011-2017) and Rapid7 (2017-2021). Several vulnerabilities affecting devices from well-known manufacturers were detected: small moduli (strictly less than 1024 bits), redundant moduli (used by several entities), invalid certificates but still in use, moduli vulnerable to the ROCA attack as well as so-called “GCD-vulnerable” moduli (i.e. moduli having common factors). For the Rapid7 database, counting nearly 600 million certificates (and including those for recent devices), we have identified 1,550,382 certificates whose moduli are GCD-vulnerable, that is 0.27% of the total number. This made it possible to factor 14,765 moduli of 2048 bits which, to our knowledge, has never been done.By analyzing certain GCD-vulnerable moduli, we were able to partially reverse-engineer the modulus generator (of 512 bits) used by certain families of firewalls, which allowed the instantaneous factorization of 42 moduli of 512 bits, corresponding certificates from 8,817 IPv4 addresses.After noting that most of the factored moduli had been generated by the OpenSSL library, we analyzed the source codes and the methods in charge of the RSA key generation process of several versions of this library (covering the period 2005 to 2021). Through experiments on platforms based on ARM processors, where we put ourselves in almost the same conditions as the vulnerable devices identified, we managed to trace the causes of the PGCD-vulnerability
Boinapally, Kashyap. "Security Certificate Renewal Management." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18453.
Full textBruhner, Carl Magnus, and Oscar Linnarsson. "Relay Racing with X.509 Mayflies : An Analysis of Certificate Replacements and Validity Periods in HTTPS Certificate Logs." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167063.
Full textGustafsson, Josef. "Certificate Transparency in Theory and Practice." Thesis, Linköpings universitet, Databas och informationsteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-125855.
Full textKlasson, Sebastian, and Nina Lindström. "Longitudinal analysis of the certificate chains of big tech company domains." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178396.
Full textPetersson, Jakob. "Analysis of Methods for Chained Connections with Mutual Authentication Using TLS." Thesis, Linköpings universitet, Informationskodning, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119455.
Full textKlepáčková, Karolína. "Aplikace pro Android na bezpečnostní monitorování komunikace." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399203.
Full textRapp, Axel. "Web site security maturity of the European Union and its member states : A survey study on the compliance with best practices of DNSSEC, HSTS, HTTPS, TLS-version, and certificate validation types." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20127.
Full textO'Neill, Mark Thomas. "The Security Layer." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/7761.
Full textSlavík, Petr. "Laboratorní úloha infrastruktury veřejných klíčů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-217981.
Full textBook chapters on the topic "Certificats SSL/TLS"
Hughes, Lawrence E. "SSL and TLS." In Pro Active Directory Certificate Services, 155–75. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7486-6_11.
Full textFiedler, Arno, and Christoph Thiel. "The need of European White Knights for the TLS/SSL Certificate System." In ISSE 2014 Securing Electronic Business Processes, 170–74. Wiesbaden: Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-06708-3_13.
Full textMogollon, Manuel. "TLS, SSL, and SET." In Cryptography and Security Services, 300–333. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch012.
Full text"Creating a Network of Trust Using X.509 Certificates." In Implementing SSL/TLS Using Cryptography and PKI, 221–96. Indianapolis, IN, USA: Wiley Publishing, Inc., 2011. http://dx.doi.org/10.1002/9781118255797.ch5.
Full textChen, Lei, Wen-Chen Hu, Ming Yang, and Lei Zhang. "Applied Cryptography in E-mail Services and Web Services." In Applied Cryptography for Cyber Security and Defense, 130–45. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch005.
Full textConference papers on the topic "Certificats SSL/TLS"
Manolache, Florin B., and Octavian Rusu. "Automated SSL/TLS Certificate Distribution System." In 2021 20th RoEduNet Conference: Networking in Education and Research (RoEduNet). IEEE, 2021. http://dx.doi.org/10.1109/roedunet54112.2021.9637722.
Full textGallersdorfer, Ulrich, and Florian Matthes. "TeSC: TLS/SSL-Certificate Endorsed Smart Contracts." In 2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS). IEEE, 2021. http://dx.doi.org/10.1109/dapps52256.2021.00016.
Full textEscarrone, Thiago, Diego Kreutz, and Maurício Fiorenza. "Uma Primeira Analise do Ecosistema HTTPS no Brasil." In XVII Escola Regional de Redes de Computadores. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/errc.2019.9226.
Full textMatsumoto, Stephanos, and Raphael M. Reischuk. "Certificates-as-an-Insurance: Incentivizing Accountability in SSL/TLS." In Workshop on Security of Emerging Networking Technologies. Reston, VA: Internet Society, 2015. http://dx.doi.org/10.14722/sent.2015.23009.
Full textChen, Yuting, and Zhendong Su. "Guided differential testing of certificate validation in SSL/TLS implementations." In ESEC/FSE'15: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2786805.2786835.
Full textChen, Chu, Cong Tian, Zhenhua Duan, and Liang Zhao. "RFC-directed differential testing of certificate validation in SSL/TLS implementations." In ICSE '18: 40th International Conference on Software Engineering. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3180155.3180226.
Full textFu, Peipei, Zhen Li, Gang Xiong, Zigang Cao, and Cuicui Kang. "SSL/TLS Security Exploration Through X.509 Certificate’s Life Cycle Measurement." In 2018 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2018. http://dx.doi.org/10.1109/iscc.2018.8538533.
Full textFiorenza, Maurício M., Diego Kreutz, Thiago Escarrone, and Daniel Temp. "Uma Análise da Utilização de HTTPS no Brasil." In Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/sbrc.2020.12338.
Full textBrubaker, Chad, Suman Jana, Baishakhi Ray, Sarfraz Khurshid, and Vitaly Shmatikov. "Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations." In 2014 IEEE Symposium on Security and Privacy (SP). IEEE, 2014. http://dx.doi.org/10.1109/sp.2014.15.
Full textChen, Chao, Wenrui Diao, Yingpei Zeng, Shanqing Guo, and Chengyu Hu. "DRLgencert: Deep Learning-Based Automated Testing of Certificate Verification in SSL/TLS Implementations." In 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 2018. http://dx.doi.org/10.1109/icsme.2018.00014.
Full text