Academic literature on the topic 'TLS Certificates'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'TLS Certificates.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "TLS Certificates"
Lapshichyov, Vitaly V. "TLS Certificates of the Tor Network and Their Distinctive Features." International Journal of Systems and Software Security and Protection 10, no. 2 (July 2019): 20–43. http://dx.doi.org/10.4018/ijsssp.2019070102.
Full textFoppe, Lucas, Jeremy Martin, Travis Mayberry, Erik C. Rye, and Lamont Brown. "Exploiting TLS Client Authentication for Widespread User Tracking." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (October 1, 2018): 51–63. http://dx.doi.org/10.1515/popets-2018-0031.
Full textLapshichyov, Vitaly V., and Oleg B. Makarevich. "Detection and identification method of the tor bundle use." Informatization and communication, no. 3 (May 5, 2020): 17–20. http://dx.doi.org/10.34219/2078-8320-2020-11-3-17-20.
Full textPark, Jun-Cheol. "Cookie-Based Identification of the Public Keys of TLS/SSL Certificates." Journal of Korean Institute of Communications and Information Sciences 41, no. 1 (January 31, 2016): 101–3. http://dx.doi.org/10.7840/kics.2015.41.1.101.
Full textAstorga, Jasone, Marc Barcelo, Aitor Urbieta, and Eduardo Jacob. "Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications." Sensors 22, no. 7 (March 27, 2022): 2561. http://dx.doi.org/10.3390/s22072561.
Full textMartynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.
Full textBusygin, A. G., A. S. Konoplev, and M. O. Kalinin. "Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates." Automatic Control and Computer Sciences 50, no. 8 (December 2016): 743–48. http://dx.doi.org/10.3103/s0146411616080290.
Full textWazan, Ahmad Samer, Romain Laborde, David W. Chadwick, Francois Barrere, Abdelmalek Benzekri, Mustafa Kaiiali, and Adib Habbal. "Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker." Security and Communication Networks 2017 (2017): 1–23. http://dx.doi.org/10.1155/2017/6907146.
Full textPan, Jiaye, Yi Zhuang, and Binglin Sun. "Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs." Security and Communication Networks 2019 (October 27, 2019): 1–22. http://dx.doi.org/10.1155/2019/8467081.
Full textLapshichyov, Vitaly, and Oleg Makarevich. "Method for Detecting and Identification of Tor Network Data by Wireshark Analyzer." Voprosy kiberbezopasnosti, no. 4(44) (2021): 73–80. http://dx.doi.org/10.21681/2311-3456-2021-4-73-80.
Full textDissertations / Theses on the topic "TLS Certificates"
Boinapally, Kashyap. "Security Certificate Renewal Management." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18453.
Full textPetersson, Jakob. "Analysis of Methods for Chained Connections with Mutual Authentication Using TLS." Thesis, Linköpings universitet, Informationskodning, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119455.
Full textBruhner, Carl Magnus, and Oscar Linnarsson. "Relay Racing with X.509 Mayflies : An Analysis of Certificate Replacements and Validity Periods in HTTPS Certificate Logs." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167063.
Full textKlasson, Sebastian, and Nina Lindström. "Longitudinal analysis of the certificate chains of big tech company domains." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178396.
Full textVelthuis, Paul. "New authentication mechanism using certificates for big data analytic tools." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215694.
Full textTraore, Mohamed. "Analyse des biais de RNG pour les mécanismes cryptographiques et applications industrielles." Thesis, Université Grenoble Alpes, 2022. http://www.theses.fr/2022GRALM013.
Full textIn this work, we analyze X.509 SSL/TLS certificates (using RSA encryption and from hundreds of millions of connected devices) looking for anomalies and notably extend the work of Hastings, Fried and Heninger (2016). Our study was carried out on three databases from EFF (2010-2011), ANSSI (2011-2017) and Rapid7 (2017-2021). Several vulnerabilities affecting devices from well-known manufacturers were detected: small moduli (strictly less than 1024 bits), redundant moduli (used by several entities), invalid certificates but still in use, moduli vulnerable to the ROCA attack as well as so-called “GCD-vulnerable” moduli (i.e. moduli having common factors). For the Rapid7 database, counting nearly 600 million certificates (and including those for recent devices), we have identified 1,550,382 certificates whose moduli are GCD-vulnerable, that is 0.27% of the total number. This made it possible to factor 14,765 moduli of 2048 bits which, to our knowledge, has never been done.By analyzing certain GCD-vulnerable moduli, we were able to partially reverse-engineer the modulus generator (of 512 bits) used by certain families of firewalls, which allowed the instantaneous factorization of 42 moduli of 512 bits, corresponding certificates from 8,817 IPv4 addresses.After noting that most of the factored moduli had been generated by the OpenSSL library, we analyzed the source codes and the methods in charge of the RSA key generation process of several versions of this library (covering the period 2005 to 2021). Through experiments on platforms based on ARM processors, where we put ourselves in almost the same conditions as the vulnerable devices identified, we managed to trace the causes of the PGCD-vulnerability
O'Neill, Mark Thomas. "The Security Layer." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/7761.
Full textDickinson, Luke Austin. "Certificate Revocation Table: Leveraging Locality of Reference in Web Requests to Improve TLS Certificate Revocation." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7010.
Full textGustafsson, Josef. "Certificate Transparency in Theory and Practice." Thesis, Linköpings universitet, Databas och informationsteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-125855.
Full textSjöström, Linus, and Carl Nykvist. "How Certificate Transparency Impact the Performance." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-140838.
Full textBooks on the topic "TLS Certificates"
Ontario. Energy Act: Revised Statutes of Ontario, 1990, chapter E.16 as amended by 1993, chapter 27, sched.; 1994, chapter 27, s. 81; 1996, chapter 19, s. 20 ; and, the following regulations (as amended) = Loi sur les hydrocarbures : Lois refondues de l'Ontario de 1990, chapitre E.16 tel qu'il est modifié par l'annexe du chap. 27 de 1993; l'art. 81 du chap. 27 de 1994; l'art. 20 du chap. 19 de 1996 ; et, les règlements suivants (tels qu'ils sont modifiés), Certificates (O. Reg. 348/96); Compressed natural gas storage, handling and utilization (O. Reg. 83/97); Fuel oil code (R.R.O. 1990, Reg. 329); Gas utilization code (O. Reg. 546/96); Oil and gas pipeline systems (O. Reg. 157/97); Propane storage, handling and utilization (O. Reg. 514/96). [Toronto]: Queen's Printer for Ontario = Imprimeur de la Reine pour l'Ontario, 2000.
Find full textNational Institute National Institute of Standards and Technology. Securing Web Transactions: TLS Server Certificate Management. Independently Published, 2018.
Find full textBook chapters on the topic "TLS Certificates"
Hughes, Lawrence E. "Issue and Manage TLS Client Certificates." In Pro Active Directory Certificate Services, 327–58. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7486-6_15.
Full textHughes, Lawrence E. "Issue and Manage TLS Server Certificates." In Pro Active Directory Certificate Services, 275–325. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7486-6_14.
Full textLi, Bingyu, Wei Wang, Lingjia Meng, Jingqiang Lin, Xuezhong Liu, and Congli Wang. "Elaphurus: Ensemble Defense Against Fraudulent Certificates in TLS." In Information Security and Cryptology, 246–59. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42921-8_14.
Full textKampanakis, Panos, and Michael Kallitsis. "Faster Post-Quantum TLS Handshakes Without Intermediate CA Certificates." In Cyber Security, Cryptology, and Machine Learning, 337–55. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07689-3_25.
Full textHughes, Lawrence E. "SSL and TLS." In Pro Active Directory Certificate Services, 155–75. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7486-6_11.
Full textBella, Giampaolo, Rosario Giustolisi, and Gabriele Lenzini. "A Socio-technical Understanding of TLS Certificate Validation." In Trust Management VII, 281–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38323-6_23.
Full textZhu, Liang, Johanna Amann, and John Heidemann. "Measuring the Latency and Pervasiveness of TLS Certificate Revocation." In Passive and Active Measurement, 16–29. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30505-9_2.
Full textRajathi, N., and Meghna Praveen. "Practical Implementation and Analysis of TLS Client Certificate Authentication." In Advances in Intelligent Systems and Computing, 695–703. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8443-5_59.
Full textFiedler, Arno, and Christoph Thiel. "The need of European White Knights for the TLS/SSL Certificate System." In ISSE 2014 Securing Electronic Business Processes, 170–74. Wiesbaden: Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-06708-3_13.
Full textWhelan, Feargal. "Schenectady Putters and Leaving Certificate Ta-Tas: Satirizing Irish Nation-Building in ‘Echo’s Bones’." In Beckett and Modernism, 147–59. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-70374-9_10.
Full textConference papers on the topic "TLS Certificates"
Torroledo, Ivan, Luis David Camacho, and Alejandro Correa Bahnsen. "Hunting Malicious TLS Certificates with Deep Neural Networks." In CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3270101.3270105.
Full textPersiano, Pino, and Ivan Visconti. "User privacy issues regarding certificates and the TLS protocol." In the 7th ACM conference. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/352600.352609.
Full textSakurai, Yuji, Takuya Watanabe, Tetsuya Okuda, Mitsuaki Akiyama, and Tatsuya Mori. "Discovering HTTPSified Phishing Websites Using the TLS Certificates Footprints." In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2020. http://dx.doi.org/10.1109/eurospw51379.2020.00077.
Full textMatsumoto, Stephanos, and Raphael M. Reischuk. "Certificates-as-an-Insurance: Incentivizing Accountability in SSL/TLS." In Workshop on Security of Emerging Networking Technologies. Reston, VA: Internet Society, 2015. http://dx.doi.org/10.14722/sent.2015.23009.
Full textNawrocki, Marcin, Pouyan Fotouhi Tehrani, Raphael Hiesgen, Jonas Mücke, Thomas C. Schmidt, and Matthias Wählisch. "On the interplay between TLS certificates and QUIC performance." In CoNEXT '22: The 18th International Conference on emerging Networking EXperiments and Technologies. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3555050.3569123.
Full textFerreira, Ana, Rosario Giustolisi, Jean-Louis Huynen, Vincent Koenig, and Gabriele Lenzini. "Studies in Socio-technical Security Analysis: Authentication of Identities with TLS Certificates." In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2013. http://dx.doi.org/10.1109/trustcom.2013.190.
Full textXia, Wei, Wei Wang, Xin He, Gang Xiong, Gaopeng Gou, Zhenzhen Li, and Zhen Li. "Old Habits Die Hard: A Sober Look at TLS Client Certificates in the Real World." In 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2021. http://dx.doi.org/10.1109/trustcom53373.2021.00029.
Full textWalsh, Kevin. "TLS with trustworthy certificate authorities." In 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, 2016. http://dx.doi.org/10.1109/cns.2016.7860543.
Full textUkrop, Martin, Lydia Kraus, Vashek Matyas, and Heider Ahmad Mutleq Wahsheh. "Will you trust this TLS certificate?" In ACSAC '19: 2019 Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3359789.3359800.
Full textHageman, Kaspar, Egon Kidmose, René Hansen, and Jens Pedersen. "Can a TLS Certificate Be Phishy?" In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010516600380049.
Full textReports on the topic "TLS Certificates"
Sethi, M., J. Preuß Mattsson, and S. Turner. Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods. RFC Editor, February 2022. http://dx.doi.org/10.17487/rfc9191.
Full textSerhrouchni, A., and H. Labiod. TLS Authentication Using Intelligent Transport System (ITS) Certificates. Edited by M. Msahli, N. Cam-Winget, and W. Whyte. RFC Editor, September 2020. http://dx.doi.org/10.17487/rfc8902.
Full textThakore, D. Transport Layer Security (TLS) Authorization Using Digital Transmission Content Protection (DTCP) Certificates. RFC Editor, July 2015. http://dx.doi.org/10.17487/rfc7562.
Full textGhedini, A., and V. Vasiliev. TLS Certificate Compression. RFC Editor, December 2020. http://dx.doi.org/10.17487/rfc8879.
Full textSaint-Andre, P., and J. Hodges. Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS). RFC Editor, March 2011. http://dx.doi.org/10.17487/rfc6125.
Full textAkram, Mehwish, William C. Barker, Rob Clatterbuck, Donna Dodson, Brandon Everhart, Jane Gilbert, William Haag, et al. Securing web transactions TLS server certificate management. Gaithersburg, MD: National Institute of Standards and Technology, June 2020. http://dx.doi.org/10.6028/nist.sp.1800-16.
Full textPettersen, Y. The Transport Layer Security (TLS) Multiple Certificate Status Request Extension. RFC Editor, June 2013. http://dx.doi.org/10.17487/rfc6961.
Full textCampbell, B., J. Bradley, N. Sakimura, and T. Lodderstedt. OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens. RFC Editor, February 2020. http://dx.doi.org/10.17487/rfc8705.
Full textShoemaker, R. B. Automated Certificate Management Environment (ACME) TLS Application‑Layer Protocol Negotiation (ALPN) Challenge Extension. RFC Editor, February 2020. http://dx.doi.org/10.17487/rfc8737.
Full textHousley, R. TLS 1.3 Extension for Certificate-Based Authentication with an External Pre-Shared Key. RFC Editor, March 2020. http://dx.doi.org/10.17487/rfc8773.
Full text