Academic literature on the topic 'Cipher suites'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cipher suites.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cipher suites"
Lara, Evangelina, Leocundo Aguilar, Jesús García, and Mauricio Sanchez. "A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices." Sensors 18, no. 10 (2018): 3326. http://dx.doi.org/10.3390/s18103326.
Full textFan, Xin Xin, Teng Wu, and Guang Gong. "An Efficient Stream Cipher WG-16 and its Application for Securing 4G-LTE Networks." Applied Mechanics and Materials 490-491 (January 2014): 1436–50. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1436.
Full textAlamer, Ahmed, Ben Soh, and David E. Brumbaugh. "MICKEY 2.0.85: A Secure and Lighter MICKEY 2.0 Cipher Variant with Improved Power Consumption for Smaller Devices in the IoT." Symmetry 12, no. 1 (2019): 32. http://dx.doi.org/10.3390/sym12010032.
Full textArunkumar, B., and G. Kousalya. "Secure and Light Weight Elliptic Curve Cipher Suites in SSL/TLS." Computer Systems Science and Engineering 40, no. 1 (2022): 179–90. http://dx.doi.org/10.32604/csse.2022.018166.
Full textFadhli, Muhamad, Fityan Ali Munshi, and Taufik Adi Wicaksono. "Ancaman Keamanan pada Transport Layer Security." Jurnal ULTIMA Computing 7, no. 2 (2016): 70–75. http://dx.doi.org/10.31937/sk.v7i2.234.
Full textArunkumar, B., and G. Kousalya. "Nonce reuse/misuse resistance authentication encryption schemes for modern TLS cipher suites and QUIC based web servers." Journal of Intelligent & Fuzzy Systems 38, no. 5 (2020): 6483–93. http://dx.doi.org/10.3233/jifs-179729.
Full textSuárez-Albela, Manuel, Paula Fraga-Lamas, Luis Castedo, and Tiago Fernández-Caramés. "Clock Frequency Impact on the Performance of High-Security Cryptographic Cipher Suites for Energy-Efficient Resource-Constrained IoT Devices." Sensors 19, no. 1 (2018): 15. http://dx.doi.org/10.3390/s19010015.
Full textYerukala, Nagendar, V. Kamakshi Prasad, and Allam Apparao. "Performance and Statistical Analysis of Stream ciphers in GSM Communications." Journal of communications software and systems 16, no. 1 (2020): 11–18. http://dx.doi.org/10.24138/jcomss.v16i1.892.
Full textSuárez-Albela, Manuel, Paula Fraga-Lamas, and Tiago Fernández-Caramés. "A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices." Sensors 18, no. 11 (2018): 3868. http://dx.doi.org/10.3390/s18113868.
Full textHieu, Minh Nguyen, Duy Ho Ngoc, Canh Hoang Ngoc, Trung Dinh Phuong, and Manh Tran Cong. "New primitives of controlled elements F2/4 for block ciphers." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 5470. http://dx.doi.org/10.11591/ijece.v10i5.pp5470-5478.
Full textDissertations / Theses on the topic "Cipher suites"
Kjell, Edvin, and Sebastian Frisenfelt. "Characterization of cipher suite selection, downgrading, and other weaknesses observed in the wild." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177184.
Full textScola, Carlo Alberto. "Valutazione della sicurezza delle comunicazioni con i principali istituti di credito online." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14741/.
Full textVignudelli, Andrea. "Filtraggio e censura dei servizi Internet Un'analisi sul protocollo SSL/TLS." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13204/.
Full textWidyopratomo, Daniel Adrianto, and 魏丹尼. "Analysis of Security Protocols and Corresponding Cipher Suites Recommended in ETSI M2M Standards." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/93038423754970301425.
Full textBook chapters on the topic "Cipher suites"
Arunkumar, B., and G. Kousalya. "Analysis of AES-GCM Cipher Suites in TLS." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68385-0_9.
Full textMoura, Ricardo, David R. Matos, Miguel L. Pardal, and Miguel Correia. "MultiTLS: Secure Communication Channels with Cipher Suite Diversity." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2_5.
Full textPoupard, Guillaume, and Serge Vaudenay. "Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Cards Applications." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10721064_24.
Full textPrinz, Stefan, Silvie Schmidt, Manuel Koschuch, Alexander Glaser, Taro Fruhwirth, and Matthias Hudler. "What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility." In E-Business and Telecommunications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30222-5_3.
Full textRenner, Sebastian, Enrico Pozzobon, and Jürgen Mottok. "A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC Ciphers on Microcontrollers." In Information and Communications Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61078-4_28.
Full textBryan, Simms. "Secret Programs with Twelve Tones, 1925–27." In Berg. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780190931445.003.0008.
Full textBudiansky, Stephen. "Colossus, Codebreaking, and the Digital Age." In Colossus. Oxford University Press, 2006. http://dx.doi.org/10.1093/oso/9780192840554.003.0011.
Full textSmith, Michael. "How It Began: Bletchley Park Goes to War." In Colossus. Oxford University Press, 2006. http://dx.doi.org/10.1093/oso/9780192840554.003.0009.
Full textConference papers on the topic "Cipher suites"
Albrecht, Martin R., Jean Paul Degabriele, Torben Brandt Hansen, and Kenneth G. Paterson. "A Surfeit of SSH Cipher Suites." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016. http://dx.doi.org/10.1145/2976749.2978364.
Full textSimos, Dimitris E., Kristoffer Kleine, Artemios G. Voyiatzis, Rick Kuhn, and Raghu Kacker. "TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach." In 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2016. http://dx.doi.org/10.1109/qrs.2016.18.
Full textKoschuch, Manuel, Taro Fruhwirth, Alexander Glaser, Silvie Schmidt, and Matthias Hudler. "Speaking in Tongues - Practical Evaluation of TLS Cipher Suites Compatibility." In International Conference on Data Communication Networking. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005507900130023.
Full textAdrianto, Daniel, and Fuchun Joseph Lin. "Analysis of security protocols and corresponding cipher suites in ETSI M2M standards." In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE, 2015. http://dx.doi.org/10.1109/wf-iot.2015.7389152.
Full textYesiltepe, Mirsat, Gulsah Kose, and Sinem Karadeniz. "Protocols of cipher suite." In 2016 Elektrik-Elektronik, Bilgisayer, Biyomedikal Muhendislikleri Bilimsel Toplantisi (EBBT) [2016 Electrical, Electronic, Computer and Biomedical Engineering Meeting (EBBT)]. IEEE, 2016. http://dx.doi.org/10.1109/ebbt.2016.7483684.
Full textNarayanan, Renuka, S. Jayashree, Nisha Deborah Philips, A. M. Saranya, Sahaya Beni Prathiba, and Gunasekaran Raja. "TLS Cipher Suite: Secure Communication of 6LoWPAN Devices." In 2019 11th International Conference on Advanced Computing (ICoAC). IEEE, 2019. http://dx.doi.org/10.1109/icoac48765.2019.246840.
Full textLee, Yoonyoung, Soonhaeng Hur, Dongho Won, and Seungjoo Kim. "Cipher Suite Setting Problem of SSL Protocol and it's Solutions." In 2009 International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 2009. http://dx.doi.org/10.1109/waina.2009.76.
Full textFrost, Vanessa, Dave (Jing) Tian, Christie Ruales, Vijay Prakash, Patrick Traynor, and Kevin R. B. Butler. "Examining DES-based Cipher Suite Support within the TLS Ecosystem." In Asia CCS '19: ACM Asia Conference on Computer and Communications Security. ACM, 2019. http://dx.doi.org/10.1145/3321705.3329858.
Full textBerthier, Paul-Edmond, Stephane Cauchie, and Zonghua Zhang. "Secure PUFs-Based Cipher Suite for Enabling TLS to Authenticate Hardware Devices." In ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security. ACM, 2015. http://dx.doi.org/10.1145/2714576.2714652.
Full textReports on the topic "Cipher suites"
Popov, A. Prohibiting RC4 Cipher Suites. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7465.
Full textKato, A., M. Kanda, and S. Kanno. Camellia Cipher Suites for TLS. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5932.
Full textYang, P. ShangMi (SM) Cipher Suites for TLS 1.3. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8998.
Full textBadra, M., and I. Hajjeh. ECDHE_PSK Cipher Suites for Transport Layer Security (TLS). RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5489.
Full textMcGrew, D., and D. Bailey. AES-CCM Cipher Suites for Transport Layer Security (TLS). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6655.
Full textSalowey, J., A. Choudhury, and D. McGrew. AES Galois Counter Mode (GCM) Cipher Suites for TLS. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5288.
Full textLangley, A., W. Chang, N. Mavrogiannopoulos, J. Strombergson, and S. Josefsson. ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS). RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7905.
Full textEronen, P., ed. DES and IDEA Cipher Suites for Transport Layer Security (TLS). RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5469.
Full textMoriai, S., A. Kato, and M. Kanda. Addition of Camellia Cipher Suites to Transport Layer Security (TLS). RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4132.
Full textLee, H. J., J. H. Yoon, and J. I. Lee. Addition of SEED Cipher Suites to Transport Layer Security (TLS). RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4162.
Full text