Journal articles on the topic 'TLS Certificates'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'TLS Certificates.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lapshichyov, Vitaly V. "TLS Certificates of the Tor Network and Their Distinctive Features." International Journal of Systems and Software Security and Protection 10, no. 2 (July 2019): 20–43. http://dx.doi.org/10.4018/ijsssp.2019070102.
Full textFoppe, Lucas, Jeremy Martin, Travis Mayberry, Erik C. Rye, and Lamont Brown. "Exploiting TLS Client Authentication for Widespread User Tracking." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (October 1, 2018): 51–63. http://dx.doi.org/10.1515/popets-2018-0031.
Full textLapshichyov, Vitaly V., and Oleg B. Makarevich. "Detection and identification method of the tor bundle use." Informatization and communication, no. 3 (May 5, 2020): 17–20. http://dx.doi.org/10.34219/2078-8320-2020-11-3-17-20.
Full textPark, Jun-Cheol. "Cookie-Based Identification of the Public Keys of TLS/SSL Certificates." Journal of Korean Institute of Communications and Information Sciences 41, no. 1 (January 31, 2016): 101–3. http://dx.doi.org/10.7840/kics.2015.41.1.101.
Full textAstorga, Jasone, Marc Barcelo, Aitor Urbieta, and Eduardo Jacob. "Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications." Sensors 22, no. 7 (March 27, 2022): 2561. http://dx.doi.org/10.3390/s22072561.
Full textMartynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.
Full textBusygin, A. G., A. S. Konoplev, and M. O. Kalinin. "Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates." Automatic Control and Computer Sciences 50, no. 8 (December 2016): 743–48. http://dx.doi.org/10.3103/s0146411616080290.
Full textWazan, Ahmad Samer, Romain Laborde, David W. Chadwick, Francois Barrere, Abdelmalek Benzekri, Mustafa Kaiiali, and Adib Habbal. "Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker." Security and Communication Networks 2017 (2017): 1–23. http://dx.doi.org/10.1155/2017/6907146.
Full textPan, Jiaye, Yi Zhuang, and Binglin Sun. "Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs." Security and Communication Networks 2019 (October 27, 2019): 1–22. http://dx.doi.org/10.1155/2019/8467081.
Full textLapshichyov, Vitaly, and Oleg Makarevich. "Method for Detecting and Identification of Tor Network Data by Wireshark Analyzer." Voprosy kiberbezopasnosti, no. 4(44) (2021): 73–80. http://dx.doi.org/10.21681/2311-3456-2021-4-73-80.
Full textde Sanjosé Blasco, José, Manuel Gómez-Lende, Manuel Sánchez-Fernández, and Enrique Serrano-Cañadas. "Monitoring Retreat of Coastal Sandy Systems Using Geomatics Techniques: Somo Beach (Cantabrian Coast, Spain, 1875–2017)." Remote Sensing 10, no. 9 (September 19, 2018): 1500. http://dx.doi.org/10.3390/rs10091500.
Full textAsratian, R. E. "Secure Network Channel for Web Services based on SSL/TLS Technology in a Linux Environment." Programmnaya Ingeneria 13, no. 3 (March 23, 2022): 124–31. http://dx.doi.org/10.17587/prin.13.124-131.
Full textFigueroa-Lorenzo, Añorga, and Arrizabalaga. "A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach." Sensors 19, no. 20 (October 14, 2019): 4455. http://dx.doi.org/10.3390/s19204455.
Full textKang, James Jin, Kiran Fahd, and Sitalakshmi Venkatraman. "Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity." Cryptography 2, no. 4 (December 5, 2018): 38. http://dx.doi.org/10.3390/cryptography2040038.
Full textKhan, Salabat, Liehuang Zhu, Zijian Zhang, Mussadiq Abdul Rahim, Khalid Khan, and Meng Li. "Attack-Resilient TLS Certificate Transparency." IEEE Access 8 (2020): 98958–73. http://dx.doi.org/10.1109/access.2020.2996997.
Full textRajakumar, Jayanth. "OVERVIEW OF TLS CERTIFICATE REVOCATION MECHANISMS." International Journal of Advanced Research in Computer Science 10, no. 3 (June 20, 2019): 54–59. http://dx.doi.org/10.26483/ijarcs.v10i3.6408.
Full textUkrop, Martin, Lydia Kraus, and Vashek Matyas. "Will You Trust This TLS Certificate?" Digital Threats: Research and Practice 1, no. 4 (December 29, 2020): 1–29. http://dx.doi.org/10.1145/3419472.
Full textPradeep, Amogh, Álvaro Feal, Julien Gamba, Ashwin Rao, Martina Lindorfer, Narseo Vallina-Rodriguez, and David Choffnes. "Not Your Average App: A Large-scale Privacy Analysis of Android Browsers." Proceedings on Privacy Enhancing Technologies 2023, no. 1 (January 2023): 29–46. http://dx.doi.org/10.56553/popets-2023-0003.
Full textTian, Cong, Chu Chen, Zhenhua Duan, and Liang Zhao. "Differential Testing of Certificate Validation in SSL/TLS Implementations." ACM Transactions on Software Engineering and Methodology 28, no. 4 (October 12, 2019): 1–37. http://dx.doi.org/10.1145/3355048.
Full textJornet-Monteverde, Julio Antonio, and Juan José Galiana-Merino. "Low-Cost Conversion of Single-Zone HVAC Systems to Multi-Zone Control Systems Using Low-Power Wireless Sensor Networks." Sensors 20, no. 13 (June 27, 2020): 3611. http://dx.doi.org/10.3390/s20133611.
Full textKhan, Salabat, Zijian Zhang, Liehuang Zhu, Meng Li, Qamas Gul Khan Safi, and Xiaobing Chen. "Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties." Security and Communication Networks 2018 (July 18, 2018): 1–16. http://dx.doi.org/10.1155/2018/8527010.
Full textAmirkhani, Shiva, Ali Bahadori-Jahromi, Anastasia Mylona, Paulina Godfrey, Darren Cook, Hooman Tahayori, and Hexin Zhang. "Uncertainties in Non-Domestic Energy Performance Certificate Generating in the UK." Sustainability 13, no. 14 (July 7, 2021): 7607. http://dx.doi.org/10.3390/su13147607.
Full textDiaz-Sanchez, Daniel, Andres Marin-Lopez, Florina Almenarez Mendoza, Patricia Arias Cabarcos, and R. Simon Sherratt. "TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications." IEEE Communications Surveys & Tutorials 21, no. 4 (2019): 3502–31. http://dx.doi.org/10.1109/comst.2019.2914453.
Full textGomez, Gibran, Platon Kotzias, Matteo Dell’Amico, Leyla Bilge, and Juan Caballero. "Unsupervised Detection and Clustering of Malicious TLS Flows." Security and Communication Networks 2023 (January 12, 2023): 1–17. http://dx.doi.org/10.1155/2023/3676692.
Full textWang, Yingjie, Guangquan Xu, Xing Liu, Weixuan Mao, Chengxiang Si, Witold Pedrycz, and Wei Wang. "Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis." Journal of Systems and Software 167 (September 2020): 110609. http://dx.doi.org/10.1016/j.jss.2020.110609.
Full textBudi P, Ignasius Irawan. "Wireless access point protection from un-authorized user in an office environment." ACMIT Proceedings 1, no. 1 (March 18, 2019): 90–98. http://dx.doi.org/10.33555/acmit.v1i1.11.
Full textFuentes, R., A. Lanero, and J. Luis Vázquez. "ARE OFFICIAL CERTIFICATIONS A RELEVANT ASPECT IN THE CONSUMPTION OF NATURAL WINES? A PROSPECTIVE STUDY AMONG SPANISH PRODUCERS/CONSUMERS." Trakia Journal of Sciences 19, Suppl.1 (2021): 393–98. http://dx.doi.org/10.15547/tjs.2021.s.01.057.
Full textKohlar, Florian, Jörg Schwenk, Meiko Jensen, and Sebastian Gajek. "On Cryptographically Strong Bindings of SAML Assertions to Transport Layer Security." International Journal of Mobile Computing and Multimedia Communications 3, no. 4 (October 2011): 20–35. http://dx.doi.org/10.4018/jmcmc.2011100102.
Full textYamakawa, Daiki, Takashi Okimoto, Songpon Teerakanok, Atsuo Inomata, and Tetsutaro Uehara. "Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA." Security and Communication Networks 2021 (February 16, 2021): 1–14. http://dx.doi.org/10.1155/2021/6610863.
Full textCueva Hurtado, Mario E., and Diego Javier Alvarado Sarango. "Análisis de Certificados SSL/TLS gratuitos y su implementación como Mecanismo de seguridad en Servidores de Aplicación." Enfoque UTE 8, no. 1 (February 24, 2017): 273–86. http://dx.doi.org/10.29019/enfoqueute.v8n1.128.
Full textSebastiany, D. B., L. Ignaczak, and M. D. V. Freitas. "Uma Análise dos Certificados Digitais Utilizados nas Conexões TLS dos Aplicativos de Mobile Banking na Plataforma Android." Revista de Empreendedorismo, Inovação e Tecnologia 2, no. 1 (June 30, 2015): 66–75. http://dx.doi.org/10.18256/2359-3539/reit-imed.v2n1p66-75.
Full textUlum, Muh Bachrul. "Kedudukan Hasil Tes DNA dalam Penetapan Status Hukum Anak Luar Nikah." Al-Manahij: Jurnal Kajian Hukum Islam 3, no. 1 (June 15, 2009): 69–82. http://dx.doi.org/10.24090/mnh.v3i1.3681.
Full textCisel, Matthieu. "Certificats de MOOC : débats passés et présents sur un objet en évolution rapide." Médiations et médiatisations 1, no. 1 (October 10, 2018): 97–101. http://dx.doi.org/10.52358/mm.v1i1.60.
Full textRosado, David Garcia, Luis Enrique Sanchez, Daniel Mellado, and Eduardo Fernandez Medina. "Content related to Computing Security on Computer Engineering Degree according to International Professional Certificates." IEEE Latin America Transactions 13, no. 6 (June 2015): 1951–60. http://dx.doi.org/10.1109/tla.2015.7164222.
Full textMacCann, Robert. "Sex Differences at the NSW Higher School Certificate after Adjustment for the Effects of Differential Selection." Australian Journal of Education 39, no. 2 (August 1995): 163–88. http://dx.doi.org/10.1177/000494419503900205.
Full textAmirkhani, Shiva, Ali Bahadori-Jahromi, Anastasia Mylona, Paulina Godfrey, and Darren Cook. "Impact of Adding Comfort Cooling Systems on the Energy Consumption and EPC Rating of an Existing UK Hotel." Sustainability 12, no. 7 (April 7, 2020): 2950. http://dx.doi.org/10.3390/su12072950.
Full textKanakam, Dr Sivarama Prasad. "ECDSA: The Virtual Signature Set of Rules of a Higher Internet." International Journal of Engineering and Computer Science 10, no. 10 (October 31, 2021): 25408–12. http://dx.doi.org/10.18535/ijecs/v10i10.4630.
Full textMontiel Paternina, Silvio. "Impacto del tlc con estados unidos sobre los sectores económicos colombianos." Saber, Ciencia y Libertad 8, no. 1 (January 1, 2013): 125–30. http://dx.doi.org/10.18041/2382-3240/saber.2013v8n1.1885.
Full textWoodside, Rachel, Gary Rosenthal, and Claudia Olivier. "90232 Implementing the innovative academic Learning Health System Scholars (aLHSS) Postdoctoral Training Program (TL1) at Wake Forest University Health Sciences (WFUHS)." Journal of Clinical and Translational Science 5, s1 (March 2021): 132–33. http://dx.doi.org/10.1017/cts.2021.739.
Full textErfani, Shiva Seyed, and Hoda Mardan. "The Relationship between Big-Five Personality Traits, English Language Proficiency Scores on IELTS, and Academic Success of Iranian Foreign Students." Theory and Practice in Language Studies 7, no. 11 (November 1, 2017): 1046. http://dx.doi.org/10.17507/tpls.0711.13.
Full textKuo, Shiue-mei. "Assessing Tertiary-level ESP Enhancement Criteria for Ameliorating Occupational Mobility: Commerce and Industry Perceptions." Theory and Practice in Language Studies 6, no. 6 (June 7, 2016): 1157. http://dx.doi.org/10.17507/tpls.0606.04.
Full textJirovetz, Leopold, Gerhard Buchbauer, Albena Stoyanova, and Anastasia Balinova. "Analysis, Chemotype and Quality Control of the Essential Oil of a New Cultivated Basil (Ocimum basilicum L.) Plant from Bulgaria." Scientia Pharmaceutica 69, no. 1 (March 30, 2001): 85–89. http://dx.doi.org/10.3797/scipharm.aut-01-10.
Full textCho, Geumhwan, Junsung Cho, Sangwon Hyun, and Hyoungshick Kim. "SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles." Applied Sciences 10, no. 9 (April 30, 2020): 3149. http://dx.doi.org/10.3390/app10093149.
Full textJailani, Jailani, Aras Mulyadi, and Rahmat Karnila. "Studi karakteristik sub kronis limbah bahan berbahaya dan beracun fly ash industri pulp dan kertas PT. Riau Andalan Pulp and Paper." Jurnal Zona 2, no. 1 (April 30, 2018): 1–11. http://dx.doi.org/10.52364/jz.v2i1.13.
Full textBHANU, CHANDRA, N. RAVISANKAR, P. C. GHASAL, JAIRAM CHOUDHARY, RAGHUVEER SINGH, K. J. RAGHVENDRA, A. L. MEENA, et al. "Knowledge based assessment of trained certified farm advisors (CFA) on organic farming." Indian Journal of Agricultural Sciences 92, no. 1 (January 31, 2022): 85–89. http://dx.doi.org/10.56093/ijas.v92i1.120845.
Full textJeon, Seungho, Chobyeol Shin, Eunnarae Ko, and Jongsub Moon. "A Secure CDM-Based Data Analysis Platform (SCAP) in Multi-Centered Distributed Setting." Applied Sciences 11, no. 19 (September 29, 2021): 9072. http://dx.doi.org/10.3390/app11199072.
Full textYani, Ivo. "PENYELENGGARAAN PEMBELAJARAN VOKASI BERDASARKAN MINAT PESERTA DIDIK PADA MATA PELAJARAN KETERAMPILAN FUNGSIONAL PAKET C." JIV-Jurnal Ilmiah Visi 13, no. 2 (December 4, 2018): 145–55. http://dx.doi.org/10.21009/jiv.1302.8.
Full textErlan, Ahmad, Sitti Chadijah, and Yusran Udin. "Persepsi Stakeholder Tentang Program Eliminasi Filariasis di Kabupaten Enrekang, Provinsi Sulawesi Selatan : Suatu Tinjauan Studi Kasus." Jurnal Vektor Penyakit 13, no. 2 (November 25, 2019): 133–40. http://dx.doi.org/10.22435/vektorp.v13i2.1097.
Full textThodberg, Karen, Louisa M. Gould, Susanne Støier, Inger Anneberg, Peter T. Thomsen, and Mette S. Herskin. "Experiences and opinions of Danish livestock drivers transporting sows regarding fitness for transport and management choices relevant for animal welfare." Translational Animal Science 4, no. 2 (February 6, 2020): 1070–81. http://dx.doi.org/10.1093/tas/txaa015.
Full textJournal, Baghdad Science. "The Impact of Operating System on Bandwidth in Open VPN Technology." Baghdad Science Journal 13, no. 1 (March 6, 2016): 204–11. http://dx.doi.org/10.21123/bsj.13.1.204-211.
Full text