Journal articles on the topic 'Certificats SSL'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Certificats SSL.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lapshichyov, Vitaly V. "TLS Certificates of the Tor Network and Their Distinctive Features." International Journal of Systems and Software Security and Protection 10, no. 2 (July 2019): 20–43. http://dx.doi.org/10.4018/ijsssp.2019070102.
Full textMinakhvatov, Bulat Rafkatovich, and Vladislav Aleksandrovich Strigunov. "SSL CERTIFICATE." Problemy sovershenstvovaniya organizatsii proizvodstva i upravleniya promyshlennymi predpriyatiyami: Mezhvuzovskii sbornik nauchnykh trudov, no. 1 (2021): 217–22. http://dx.doi.org/10.46554/op-mie-2021.1-pp.217.
Full textCueva Hurtado, Mario E., and Diego Javier Alvarado Sarango. "Análisis de Certificados SSL/TLS gratuitos y su implementación como Mecanismo de seguridad en Servidores de Aplicación." Enfoque UTE 8, no. 1 (February 24, 2017): 273–86. http://dx.doi.org/10.29019/enfoqueute.v8n1.128.
Full textFoppe, Lucas, Jeremy Martin, Travis Mayberry, Erik C. Rye, and Lamont Brown. "Exploiting TLS Client Authentication for Widespread User Tracking." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (October 1, 2018): 51–63. http://dx.doi.org/10.1515/popets-2018-0031.
Full textLapshichyov, Vitaly V., and Oleg B. Makarevich. "Detection and identification method of the tor bundle use." Informatization and communication, no. 3 (May 5, 2020): 17–20. http://dx.doi.org/10.34219/2078-8320-2020-11-3-17-20.
Full textSebastian, S., and R. S. Chouhan. "Privacy Preservation and Data Security on Internet Using Mutual Ssl." Oriental journal of computer science and technology 10, no. 1 (March 22, 2017): 249–54. http://dx.doi.org/10.13005/ojcst/10.01.34.
Full textPark, Jun-Cheol. "Cookie-Based Identification of the Public Keys of TLS/SSL Certificates." Journal of Korean Institute of Communications and Information Sciences 41, no. 1 (January 31, 2016): 101–3. http://dx.doi.org/10.7840/kics.2015.41.1.101.
Full textKumar, Rajesh, and K. Rekha. "Strengthening SSL Security with attribute certificate." EAI Endorsed Transactions on Cloud Systems 3, no. 11 (April 11, 2018): 154465. http://dx.doi.org/10.4108/eai.11-4-2018.154465.
Full textFedkova, N. A., and D. A. Fedkov. "Development of PowerShell Scripts for Automating Windows OS Administration Processes. Automating the Process of Creating and Distributing SSL Certificates to Servers." Vestnik NSU. Series: Information Technologies 20, no. 1 (May 17, 2022): 81–96. http://dx.doi.org/10.25205/1818-7900-2022-20-1-81-96.
Full textMeyer, Helen. "Securing intranet data with SSL client certificates." Computers & Security 16, no. 4 (January 1997): 334. http://dx.doi.org/10.1016/s0167-4048(97)80213-1.
Full textAu, Andrew C. H., Brenda H. S. Lam, Y. C. Kwan, and Angus K. K. Tung. "Pressure Calibration of Quarter-Inch Working Standard Microphones by Comparison." NCSLI Measure 14, no. 1 (2022): 40–48. http://dx.doi.org/10.51843/measure.14.1.7.
Full textXu, Da Wei. "The Implementation of Mobile Agent System Based X.509 Certificate." Advanced Materials Research 403-408 (November 2011): 1270–73. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1270.
Full textKappenberger, Reiner. "The true cost of self-signed SSL certificates." Computer Fraud & Security 2012, no. 9 (September 2012): 14–16. http://dx.doi.org/10.1016/s1361-3723(12)70092-1.
Full textB, Risma, Azhar Azhar, and Makhdalena Makhdalena. "IMPLEMENTASI KERANGKA KUALIFIKASI NASIONAL INDONESIA DI LEMBAGA KURSUS UNIVERSAL SKILL PEKANBARU." Jurnal Manajemen Pendidikan Penelitian Kualitatif 2, no. 2 (September 29, 2018): 242. http://dx.doi.org/10.31258/jmppk.2.2.p.242-247.
Full textTian, Cong, Chu Chen, Zhenhua Duan, and Liang Zhao. "Differential Testing of Certificate Validation in SSL/TLS Implementations." ACM Transactions on Software Engineering and Methodology 28, no. 4 (October 12, 2019): 1–37. http://dx.doi.org/10.1145/3355048.
Full textThurimella, Ramakrishna, and William Mitchell. "Cloak and Dagger." International Journal of Information Security and Privacy 3, no. 3 (July 2009): 55–75. http://dx.doi.org/10.4018/jisp.2009100704.
Full textAntonishyn, Mykhailo. "Four ways to bypass Android SSL. Verification and Certificate Pinning." Transfer of Innovative Technologies 3, no. 1 (September 3, 2020): 96–99. http://dx.doi.org/10.32347/tit2020.31.0302.
Full textSeniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle, and Fahmi Fahmi. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 507. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp507-515.
Full textDakov, Stanislav, and Anna Malinova. "A SURVEY OF E-COMMERCE SECURITY THREATS AND SOLUTIONS." Proceedings of CBU in Natural Sciences and ICT 2 (October 24, 2021): 1–9. http://dx.doi.org/10.12955/pns.v2.135.
Full textMartynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.
Full textKATO, Hiroya, Shuichiro HARUTA, and Iwao SASASE. "Android Malware Detection Scheme Based on Level of SSL Server Certificate." IEICE Transactions on Information and Systems E103.D, no. 2 (February 1, 2020): 379–89. http://dx.doi.org/10.1587/transinf.2019edp7119.
Full textHermawan, Tommy. "Legal Certainty To Double Land Statement Letter (Skl) Holders In Land Boarders (Study Case In Teteilanan Village, South Barito Regency, Center Kalimantan)." Pancasila and Law Review 1, no. 2 (January 5, 2021): 137. http://dx.doi.org/10.25041/plr.v1i2.2157.
Full textZhang, Liang, David Choffnes, Tudor Dumitraş, Dave Levin, Alan Mislove, Aaron Schulman, and Christo Wilson. "Analysis of SSL certificate reissues and revocations in the wake of heartbleed." Communications of the ACM 61, no. 3 (February 21, 2018): 109–16. http://dx.doi.org/10.1145/3176244.
Full textBostan, Atila. "Implicit learning with certificate warning messages on SSL web pages: what are they teaching?" Security and Communication Networks 9, no. 17 (August 25, 2016): 4295–300. http://dx.doi.org/10.1002/sec.1607.
Full textWang, Yingjie, Guangquan Xu, Xing Liu, Weixuan Mao, Chengxiang Si, Witold Pedrycz, and Wei Wang. "Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis." Journal of Systems and Software 167 (September 2020): 110609. http://dx.doi.org/10.1016/j.jss.2020.110609.
Full textSun, Yunxiao, Bailing Wang, Chao Wang, and Yuliang Wei. "On Man-in-the-Middle Attack Risks of the VPN Gate Relay System." Security and Communication Networks 2021 (October 21, 2021): 1–7. http://dx.doi.org/10.1155/2021/9091675.
Full textTambunan, Alexander Theo Philus, Adi Prijuna Lubis, and Syartika Anggraini. "Perancangan Sistem Keamanan File Transfer Protocol Dengan Secure Socket Layer Pada Server Centos 7." J-Com (Journal of Computer) 1, no. 2 (July 31, 2021): 95–102. http://dx.doi.org/10.33330/j-com.v2i1.1206.
Full textŞAHİN, Mehmet. "MOTIVATIONS OF SLL-WEB SERVICE ADMINISTRATORS IN USING SELF-SIGNED DIGITAL CERTIFICATES." Journal of Social Sciences 2, no. 4 (January 1, 2015): 209. http://dx.doi.org/10.16990/sobider.90.
Full textLi, Chi, Zuxing Gu, Min Zhou, Jiecheng Wu, Jiarui Zhang, and Ming Gu. "API Misuse Detection in C Programs: Practice on SSL APIs." International Journal of Software Engineering and Knowledge Engineering 29, no. 11n12 (November 2019): 1761–79. http://dx.doi.org/10.1142/s0218194019400205.
Full textLapshichyov, Vitaly, and Oleg Makarevich. "Method for Detecting and Identification of Tor Network Data by Wireshark Analyzer." Voprosy kiberbezopasnosti, no. 4(44) (2021): 73–80. http://dx.doi.org/10.21681/2311-3456-2021-4-73-80.
Full textLee, Khan-yong. "Features of Geography Assessment in Republic of South Africa : Focusing on Geography Examinations of National Senior Certificate." Social Studies Education 57, no. 3 (September 30, 2018): 153–70. http://dx.doi.org/10.37561/sse.2018.09.57.3.153.
Full textMoskalets, V. V., T. Z. Moskalets, I. V. Grynyk, O. A. Shevchuk, and O. O. Khodanitska. "Breeding study of sea buckthorn (Hippophae rhamnoides L.) in the Institute of Horticulture, NAAS оf Ukraine." Horticulture: Interdepartment Subject Scientific Collection, no. 75 (2020): 37–49. http://dx.doi.org/10.35205/0558-1125-2020-75-37-49.
Full textSøgaard, Hans Jørgen, and Per Bech. "Psychometric analysis of Common Mental Disorders — Screening Questionnaire (CMD-SQ) in long-term sickness absence." Scandinavian Journal of Public Health 37, no. 8 (August 28, 2009): 855–63. http://dx.doi.org/10.1177/1403494809344653.
Full textGea, Asaziduhu, and Lisda Junita. "PENERAPAN CRM BERBASIS WEB DAN SMS GATEWAY PELAYANAN ADMINISTRASI UMUM DI DISDUKCAPIL KABUPATEN LANGKAT.pdf." JURNAL ARMADA INFORMATIKA 3, no. 1 (August 1, 2019): 23–35. http://dx.doi.org/10.36520/jai.v3i1.42.
Full textTsai, Chia-Wen, and Pei-Di Shen. "The Application of Web and Educational Technologies in Supporting Web-Enabled Self-Regulated Learning in Different Computing Course Orientations." International Journal of Information and Communication Technology Education 7, no. 1 (January 2011): 70–79. http://dx.doi.org/10.4018/jicte.2011010107.
Full textGu, Jung-Eun, Joongu Kang, and Sang Hwa Jung. "Characteristics of Underwater Acoustics in Different Habitat Types along a Natural River Channel." Water 14, no. 21 (November 3, 2022): 3538. http://dx.doi.org/10.3390/w14213538.
Full textHasa, Michal, and Miloš Zich. "Nonlinear Analysis of Precast Dapped-End Beams." Solid State Phenomena 259 (May 2017): 184–89. http://dx.doi.org/10.4028/www.scientific.net/ssp.259.184.
Full textAffandi, Muhammad. "Implementasi Virtual Private Network (Vpn) Open vpn Dengan Keamanan Sertifikat SSL pada Network Attached Storage (Nas) Freenas." Jurnal Impresi Indonesia 1, no. 12 (December 20, 2022): 1329–41. http://dx.doi.org/10.58344/jii.v1i12.748.
Full textTaylor, Sarah. "Growing Up in a Steel Town: Early-Life Pollution Exposure and Later-Life Mortality." Social Science History 44, no. 1 (2020): 117–42. http://dx.doi.org/10.1017/ssh.2019.45.
Full textAsratian, R. E. "Secure Network Channel for Web Services based on SSL/TLS Technology in a Linux Environment." Programmnaya Ingeneria 13, no. 3 (March 23, 2022): 124–31. http://dx.doi.org/10.17587/prin.13.124-131.
Full textKang, James Jin, Kiran Fahd, and Sitalakshmi Venkatraman. "Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity." Cryptography 2, no. 4 (December 5, 2018): 38. http://dx.doi.org/10.3390/cryptography2040038.
Full textTrisnowati, Nina. "Legal Protection for Creditors Against Validity of Trade Binding Act with Loan Without Dependent Rights (Analysis of Verdict Number: 34/Pdt/2017/PT. YYK and Number : 214/Pdt.G/2014/PN.Jkt Sel)." Authentica 3, no. 2 (February 8, 2021): 163–85. http://dx.doi.org/10.20884/1.atc.2020.3.2.45.
Full textSánchez-Valdés, Arlen, Rosa María Nava-Rogel, and Alejandro Delgado-Cruz. "Motivaciones de empresas turísticas para certificarse en calidad. Evidencia empírica en el Estado de México." Revista Venezolana de Gerencia 26, no. 93 (January 28, 2021): 349–69. http://dx.doi.org/10.52080/rvg93.24.
Full textKabak, L., O. P. Bulanyi, O. N. Molotkov, and V. V. Kuts. "Research of information protection possibility by built-in packages of data cryptosecurity for MS SQL server and Oracle certificates." Systems and Technologies 1(57) (2019): 107–23. http://dx.doi.org/10.32836/2521-6643-2019-1-57-7.
Full textWallett, Lucy, Wentin Chen, Lucretia Thomas, Parisha Blaggan, Emma Ooi, Dengyi Zhou, Thia Hanania, et al. "Developing a simulation-based learning model for acute medical education during COVID-19 pandemic with Simulation via Instant Messaging – Birmingham Advance (SIMBA)." BMJ Open Quality 11, no. 2 (April 2022): e001565. http://dx.doi.org/10.1136/bmjoq-2021-001565.
Full textPan, Jiaye, Yi Zhuang, and Binglin Sun. "Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs." Security and Communication Networks 2019 (October 27, 2019): 1–22. http://dx.doi.org/10.1155/2019/8467081.
Full textNayeem, FMH, MN Hoque, M. Ali, MM Islam, and S. Haque. "Nature and extent of forest resource extraction from Modhupur Sal forest by the community." Progressive Agriculture 28, no. 2 (August 9, 2017): 148–55. http://dx.doi.org/10.3329/pa.v28i2.33476.
Full textJournal, Baghdad Science. "The Impact of Operating System on Bandwidth in Open VPN Technology." Baghdad Science Journal 13, no. 1 (March 6, 2016): 204–11. http://dx.doi.org/10.21123/bsj.13.1.204-211.
Full textCabezas, Víctor Goyes, Miguel Goyes Cabezas, Oscar Mora Castro, Joffre León Paredes, Mario Quispe Sandoval, Yary Ruiz Parrales, Carlos Castro Arteaga, and Miguel Fuentes Fajardo. "Tolerância de cultivares de arroz (Oryza sativa L.), ao complexo de coloração de grãos na estação chuvosa da costa equatoriana / Tolerance of rice cultivars (Oryza sativa L.), to the grain spotting complex in the rainy season on the Ecuadorian coast." Brazilian Journal of Animal and Environmental Research 4, no. 4 (December 29, 2021): 6616–28. http://dx.doi.org/10.34188/bjaerv4n4-141.
Full textBondan Dwisetyo, Maharani Ratna Palupi, and Fajar Budi Utomo. "UNCERTAINTY ANALYSIS OF LABORATORY MEASUREMENT OF AIRBORNE SOUND INSULATION." Spektra: Jurnal Fisika dan Aplikasinya 5, no. 2 (August 31, 2020): 97–108. http://dx.doi.org/10.21009/spektra.052.02.
Full text