Добірка наукової літератури з теми "Certificats SSL"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Certificats SSL".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Certificats SSL"

1

Lapshichyov, Vitaly V. "TLS Certificates of the Tor Network and Their Distinctive Features." International Journal of Systems and Software Security and Protection 10, no. 2 (July 2019): 20–43. http://dx.doi.org/10.4018/ijsssp.2019070102.

Повний текст джерела
Анотація:
This article presents the results of an experimental study of the properties of SSL/TLS certificates of an anonymous Tor network, based on which it is concluded that there are several features that differ from other SSL/TLS certificates. At present, in the scientific literature and in the documentation of U.S. National Security Agency, and the U.K. Government Communications Headquarters devoted to the identification of Tor network traffic, two signs of SSL/TLS certificates are indicated - the name of the certificate subject, as well as the port of the certificate transmission and network connection. The results of an experimental study allow the authors to state with a high degree of probability that Tor network certificates can be identified in the data stream between the client and server of the specified network by their size, which is between 400 and 600 bytes. The list of features of the Tor network certificates is intended to develop software or add-ons to existing ones, which is used to block access of Internet users to Darknet resources or to limit the use of the Tor anonymous network service. Based on data on the distinguishing features of Tor network certificates, an algorithm is proposed for blocking access to the Internet for users of the Tor Bundle.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Minakhvatov, Bulat Rafkatovich, and Vladislav Aleksandrovich Strigunov. "SSL CERTIFICATE." Problemy sovershenstvovaniya organizatsii proizvodstva i upravleniya promyshlennymi predpriyatiyami: Mezhvuzovskii sbornik nauchnykh trudov, no. 1 (2021): 217–22. http://dx.doi.org/10.46554/op-mie-2021.1-pp.217.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Cueva Hurtado, Mario E., and Diego Javier Alvarado Sarango. "Análisis de Certificados SSL/TLS gratuitos y su implementación como Mecanismo de seguridad en Servidores de Aplicación." Enfoque UTE 8, no. 1 (February 24, 2017): 273–86. http://dx.doi.org/10.29019/enfoqueute.v8n1.128.

Повний текст джерела
Анотація:
La seguridad en la capa de aplicación (SSL), proporciona la confidencialidad, integridad y autenticidad de los datos, entre dos aplicaciones que se comunican entre sí. El presente artículo es el resultado de haber implementado certificados SSL / TLS gratuitos en servidores de aplicación, determinando las características relevantes que debe tener un certificado SSL/TLS, la Autoridad certificadora que lo emita. Se realiza un análisis de las vulnerabilidades en los servidores web y se establece un canal cifrado de comunicaciones con el fin de proteger de ataques como hombre en el medio, phising y mantener la integridad de la información que es trasmitida entre el cliente y servidor.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Foppe, Lucas, Jeremy Martin, Travis Mayberry, Erik C. Rye, and Lamont Brown. "Exploiting TLS Client Authentication for Widespread User Tracking." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (October 1, 2018): 51–63. http://dx.doi.org/10.1515/popets-2018-0031.

Повний текст джерела
Анотація:
Abstract TLS, and SSL before it, has long supported the option for clients to authenticate to servers using their own certificates, but this capability has not been widely used. However, with the development of its Push Notification Service, Apple has deployed this technology on millions of devices for the first time. Wachs et al. [42] determined iOS client certificates could be used by passive network adversaries to track individual devices across the internet. Subsequently, Apple has patched their software to fix this vulnerability. We show these countermeasures are not effective by demonstrating three novel active attacks against TLS Client Certificate Authentication that are successful despite the defenses. Additionally, we show these attacks work against all known instances of TLS Client Certificate Authentication, including smart cards like those widely deployed by the Estonian government as part of their Digital ID program. Our attacks include in-path man-in-the-middle versions as well as a more powerful on-path attack that can be carried out without full network control.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Lapshichyov, Vitaly V., and Oleg B. Makarevich. "Detection and identification method of the tor bundle use." Informatization and communication, no. 3 (May 5, 2020): 17–20. http://dx.doi.org/10.34219/2078-8320-2020-11-3-17-20.

Повний текст джерела
Анотація:
This paper presents the result of author’s research aimed at developing a detecting and identifying method of the Tor Bundle use in data transmission networks, in particular, on the Internet. Based on these characteristics, an algorithm has been developed that allows legitimate blocking of user access to a global network by a popular anonymizer. The subject of the study was an SSL/TLS encryption certificate, which is transmitted by the Tor network server to the user of the Tor Bundle and which contains the set of data necessary for its identification during the implementation of the TLS “handshake”. In the course of the study of the certificates features, several distinguishing features were identified, namely: the name of the subject and issuer of the certificate, which is a random set of letters and numbers; port used when connecting to an anonymous network; certificate size. Based on the data received, a method is proposed that allows the provider’s server to block the connection during which a certificate with certain characteristics is transmitted.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Sebastian, S., and R. S. Chouhan. "Privacy Preservation and Data Security on Internet Using Mutual Ssl." Oriental journal of computer science and technology 10, no. 1 (March 22, 2017): 249–54. http://dx.doi.org/10.13005/ojcst/10.01.34.

Повний текст джерела
Анотація:
It is essential to maintain a ratio between privacy protection and knowledge discovery. Internet users depend daily on SSL/HTPS for secure communication on internet. Over the years, many attacks on the certificate trust model it uses have been evolved. Mutual SSL authentication shared verification alludes to two parties validating each other through checking the digital certificate so that both sides are guaranteed of the other’s identity. In technical terms, it alludes to a client (web program or client application) authenticate themselves to the server (server application) and that server likewise confirming itself to the client through checking the general public key certificate issued by trusted Certificate Authorities (CA). Since confirmation depends on computerized Certificate, certification authorities, for example, Verisign or Microsoft Declaration Server are a critical part of mutual authentication process. From an abnormal state perspective, the way toward authenticating and setting up an encrypted channel using certificate-based mutual SSL authentication.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Park, Jun-Cheol. "Cookie-Based Identification of the Public Keys of TLS/SSL Certificates." Journal of Korean Institute of Communications and Information Sciences 41, no. 1 (January 31, 2016): 101–3. http://dx.doi.org/10.7840/kics.2015.41.1.101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Kumar, Rajesh, and K. Rekha. "Strengthening SSL Security with attribute certificate." EAI Endorsed Transactions on Cloud Systems 3, no. 11 (April 11, 2018): 154465. http://dx.doi.org/10.4108/eai.11-4-2018.154465.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Fedkova, N. A., and D. A. Fedkov. "Development of PowerShell Scripts for Automating Windows OS Administration Processes. Automating the Process of Creating and Distributing SSL Certificates to Servers." Vestnik NSU. Series: Information Technologies 20, no. 1 (May 17, 2022): 81–96. http://dx.doi.org/10.25205/1818-7900-2022-20-1-81-96.

Повний текст джерела
Анотація:
The article describes the process of automating Windows administration, in particular, automating the process of creating and distributing SSL certificates to servers. The built-in command shell PowerShell is used for development. Theoretical aspects of the subject are given: the concept of SSL certificates, the purpose of Vault storage and Consul service. The results of development in the form of code listings are presented.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Meyer, Helen. "Securing intranet data with SSL client certificates." Computers & Security 16, no. 4 (January 1997): 334. http://dx.doi.org/10.1016/s0167-4048(97)80213-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Certificats SSL"

1

Traore, Mohamed. "Analyse des biais de RNG pour les mécanismes cryptographiques et applications industrielles." Thesis, Université Grenoble Alpes, 2022. http://www.theses.fr/2022GRALM013.

Повний текст джерела
Анотація:
Dans ce travail, nous analysons des certificats SSL/TLS X.509 (utilisant le chiffrement RSA et provenant de centaines de millions de matériels connectés) à la recherche d'anomalies et étendons notamment les travaux de Hastings, Fried et Heninger (2016). Notre étude a été réalisée sur trois bases de données provenant de l'EFF (2010-2011), de l'ANSSI (2011-2017) et de Rapid7 (2017-2021). Plusieurs vulnérabilités affectant des matériels de fabricants connus furent détectées : modules de petites tailles (strictement inférieures à 1024 bits), modules redondants (utilisés par plusieurs entités), certificats invalides mais toujours en usage, modules vulnérables à l'attaque ROCA ainsi que des modules dits «PGCD-vulnérables» (c'est-à-dire des modules ayant des facteurs communs). Pour la base de données de Rapid7, dénombrant près de 600 millions de certificats (et incluant ceux des matériels récents), nous avons identifié 1,550,382 certificats dont les modules sont PGCD-vulnérables, soit 0.27% du nombre total. Cela a permis de factoriser 14,765 modules de 2048 bits ce qui, à notre connaissance, n'a jamais été fait.En analysant certains modules PGCD-vulnérables, on a pu rétro-concevoir de façon partielle le générateur de modules (de 512 bits) utilisé par certaines familles de pare-feux, ce qui a permis la factorisation instantanée de 42 modules de 512 bits, correspondant aux certificats provenant de 8,817 adresses IPv4.Après avoir constaté que la plupart des modules factorisés avaient été générés par la bibliothèque OpenSSL, on a analysé les codes sources et les méthodes en charge du processus de génération de clefs RSA de plusieurs versions de cette bibliothèque (couvrant la période 2005 à 2021). À travers des expérimentations sur des plateformes à base de processeurs ARM, où l'on s'est mis quasiment dans les mêmes conditions que les matériels vulnérables identifiés, on a réussi à remonter aux causes de la PGCD-vulnérabilité
In this work, we analyze X.509 SSL/TLS certificates (using RSA encryption and from hundreds of millions of connected devices) looking for anomalies and notably extend the work of Hastings, Fried and Heninger (2016). Our study was carried out on three databases from EFF (2010-2011), ANSSI (2011-2017) and Rapid7 (2017-2021). Several vulnerabilities affecting devices from well-known manufacturers were detected: small moduli (strictly less than 1024 bits), redundant moduli (used by several entities), invalid certificates but still in use, moduli vulnerable to the ROCA attack as well as so-called “GCD-vulnerable” moduli (i.e. moduli having common factors). For the Rapid7 database, counting nearly 600 million certificates (and including those for recent devices), we have identified 1,550,382 certificates whose moduli are GCD-vulnerable, that is 0.27% of the total number. This made it possible to factor 14,765 moduli of 2048 bits which, to our knowledge, has never been done.By analyzing certain GCD-vulnerable moduli, we were able to partially reverse-engineer the modulus generator (of 512 bits) used by certain families of firewalls, which allowed the instantaneous factorization of 42 moduli of 512 bits, corresponding certificates from 8,817 IPv4 addresses.After noting that most of the factored moduli had been generated by the OpenSSL library, we analyzed the source codes and the methods in charge of the RSA key generation process of several versions of this library (covering the period 2005 to 2021). Through experiments on platforms based on ARM processors, where we put ourselves in almost the same conditions as the vulnerable devices identified, we managed to trace the causes of the PGCD-vulnerability
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Bruhner, Carl Magnus, and Oscar Linnarsson. "Relay Racing with X.509 Mayflies : An Analysis of Certificate Replacements and Validity Periods in HTTPS Certificate Logs." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167063.

Повний текст джерела
Анотація:
Certificates are the foundation of secure communication over the internet as of today. While certificates can be issued with long validity periods, there is always a risk of having them compromised during their lifetime. A good practice is therefore to use shorter validity periods. However, this limits the certificate lifetime and gives less flexibility in the timing of certificate replacements. In this thesis, we use publicly available network logs from Rapid7's Project Sonar to provide an overview of the current state of certificate usage behavior. Specifically, we look at the Let's Encrypt mass revocation event in March 2020, where millions of certificates were revoked with just five days notice. In general, we show how this kind of datasets can be used, and as a deeper exploration we analyze certificate validity, lifetime and use of certificates with overlapping validity periods, as well as discuss how our findings relate to industry standard and current security trends. Specifically, we isolate automated certificate services such as Let's Encrypt and cPanel to see how their certificates differ in characteristics from other certificates in general. Based on our findings, we propose a set of rules to help improve the trust in certificate usage and strengthen security online, introducing an Always secure policy aligning certificate validity with revocation time limits in order to replace revocation requirements and overcoming the fact that mobile devices today ignore this very important security feature. To round things off, we provide some ideas for further research based on our findings and what we see possible with datasets such as the one researched in this thesis.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Boinapally, Kashyap. "Security Certificate Renewal Management." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18453.

Повний текст джерела
Анотація:
Context. An SSL encrypted client-server communication is necessary to maintain the security and privacy of the communication. For an SSL encryption to work, there should be a security certificate which has a certain expiry period. Periodic renewal of the certificate after its expiry is a waste of time and an effort on part of the company. Objectives. In this study, a new system has been developed and implemented, which sends a certificate during prior communication and does not wait for the certificate to expire. Automating the process to a certain extent was done to not compromise the security of the system and to speed up the process and reduce the downtime. Methods. Experiments have been conducted to test the new system and compare it to the old system. The experiments were conducted to analyze the packets and the downtime occurring from certificate renewal. Results. The results of the experiments show that there is a significant reduction in downtime. This was achieved due to the implementation of the new system and semi-automation Conclusions. The system has been implemented, and it greatly reduces the downtime occurring due to the expiry of the security certificates. Semi-Automation has been done to not hamper the security and make the system robust.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Klasson, Sebastian, and Nina Lindström. "Longitudinal analysis of the certificate chains of big tech company domains." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178396.

Повний текст джерела
Анотація:
The internet is one of the most widely used mediums for communication in modern society and it has become an everyday necessity for many. It is therefore of utmost importance that it remains as secure as possible. SSL and TLS are the backbones of internet security and an integral part of these technologies are the certificates used. Certificate authorities (CAs) can issue certificates that validate that domains are who they claim to be. If a user trusts a CA they can in turn also trust domains that have been validated by them. CAs can in turn trust other CAs and this, in turn, creates a chain of trust called a certificate chain. In this thesis, the structure of these certificate chains is analysed and a longitudinal dataset is created. The analysis looks at how the certificate chains have changed over time and puts extra focus on the domains of big tech companies. The dataset created can also be used for further analysis in the future and will be a useful tool in the examination of historical certificate chains. Our findings show that the certificate chains of the domains studied do change over time; both their structure and the lengths of them vary noticeably. Most of the observed domains show a decrease in average chain length between the years of 2013 and 2020 and the structure of the chains vary significantly over the years.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Gustafsson, Josef. "Certificate Transparency in Theory and Practice." Thesis, Linköpings universitet, Databas och informationsteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-125855.

Повний текст джерела
Анотація:
Certificate Transparency provides auditability to the widely used X.509 Public Key Infrastructure (PKIX) authentication in Transport Layer Security (TLS) protocol. Transparency logs issue signed promises of inclusions to be used together with certificates for authentication of TLS servers. Google Chrome enforces the use of Certificate Transparency for validation of Extended Validation (EV) certificates. This thesis proposes a methodology for asserting correct operation and presents a survey of active Logs. An experimental Monitor has been implemented as part of the thesis. Varying Log usage patterns and metadata about Log operation are presented, and Logs are categorized based on characteristics and usage. A case of mis-issuance by Symantec is presented to show the effectiveness of Certificate Transparency.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Khanna, Isha. "Phishing on Open WLANs: Threat and Preventive Measure." Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/36170.

Повний текст джерела
Анотація:
Phishing is an internet security issue whose shape is still changing and size is still increasing. This thesis shows the possibility of a phishing attack on open, private Wireless LANs. Private WLANs which use a login page to authenticate users in hotels, airports and academic campuses are all vulnerable to this attack. Virginia Tech's WLAN is used as an example to show that the attack is possible. The attack combines two very well known attacks: one is to deceptively guide a user into logging into a fake website, which shows similar log-in page to the page of the website the user intends to go to, and the second attack is to show users a valid certificate, which does not show a warning. The rogue server takes the user to a log-in page which is similar to Virginia Tech's log-in page and shows him a valid security certificate. We present a solution to the proposed problem. Software is implemented that runs on Windows Vista. The software warns the user if there are servers with more than one type of security certificates, claiming to be from the same network. We contrast our method to already existing methods, and show in what respects our solution is better. The biggest advantage of this method is that it involves no change on the server side. It is not necessary for the users to have any prior knowledge of the network, which is very helpful when the users access WLAN at airports and hotels. Also, when using this method, the user does not need to connect to any network, and is still able to get a warning. It however, requires the user to be able to differentiate between the real and fake networks after the user has been warned.
Master of Science
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Meihong, Li, Zhang Qishan, and Wang Jun. "RESEARCH AND IMPLEMENTATION OF MOBILE BANK BASED ON SSL." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605837.

Повний текст джерела
Анотація:
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada
SSL protocol is one industrial standard to protect data transferred securely on Internet. Firstly SSL is analyzed, according to its characteristics, one solution plan on mobile bank based on SSL is proposed and presented, in which GPRS technology is adopted and elliptic curve algorithm is used for the session key, finally several functional modules of mobile bank are designed in details and its security is analyzed.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Collett, Torstein Calvin. "Simple SSH Management." BYU ScholarsArchive, 2021. https://scholarsarchive.byu.edu/etd/9130.

Повний текст джерела
Анотація:
SSH certificates are used by administrators so connections to the server can be verified. This ensures that only authorized administrators can access the server and that the server being accessed is the intended machine. Current solutions for managing SSH certificates are focused on commercial use, which makes them cumbersome for small groups and individuals to use. These solutions require running multiple services that companies already use but add significant overhead for smaller groups. We developed a new standalone system that makes it easy to manage SSH certificates for small amounts of servers and users, without requiring additional servers to be deployed. We evaluated our system with a user study to demonstrate its ease of use. We hope that this implementation can help guide future research toward a more simplified certificate authentication system for SSH.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Dotzky, Jesper, and Jon Wiklund. "Extern Web-service-lösning vid SSAB Tunnplåt i Borlänge- för kommunikation med sina distributions lager." Thesis, Högskolan Dalarna, Informatik, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:du-401.

Повний текст джерела
Анотація:
Detta examensarbete har utförts på SSAB- Tunnplåt i Borlänge under vårterminen 2004 och omfattar 10 veckors arbete.SSAB sköter idag sin kommunikation med distributionslagren via fax, telefon eller e-post. Eftersom detta är ett ganska tidskrävande kommunikationssätt, vill SSAB ha en smidigare och snabbare kommunikationslösning. Den lösning som SSAB vill ha är en extern Web-service-lösning för att upprätta en säker kommunikation med sina distributionslager.Parallellt med byggandet av Web-service-lösningen arbetades en förvaltningsmodell fram. Den beskriver hur förvaltningsorganisationen med dess rutiner kan se ut vid implementering av lösningen.För att skapa en säker förbindelse med Web-servicen skall en webbklient användas som i sin tur anropar en COM+ komponent. Detta för att kunna skicka med certifikatet ifrån webbklienten till webbservern där Web-servicen ligger. COM+ komponenten måste få tillgång till en användarprofil när den kommunicerar med Web-servicen. Detta för att kunna upprätta en SSL-förbindelse i det inledande skedet. SSL-förbindelsen skall läggas i den VPN-tunnel som mVPN tillhandahåller via WSSAL.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Petersson, Jakob. "Analysis of Methods for Chained Connections with Mutual Authentication Using TLS." Thesis, Linköpings universitet, Informationskodning, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119455.

Повний текст джерела
Анотація:
TLS is a vital protocol used to secure communication over networks and it provides an end- to-end encrypted channel between two directly communicating parties. In certain situations it is not possible, or desirable, to establish direct connections from a client to a server, as for example when connecting to a server located on a secure network behind a gateway. In these cases chained connections are required. Mutual authentication and end-to-end encryption are important capabilities in a high assur- ance environment. These are provided by TLS, but there are no known solutions for chained connections. This thesis explores multiple methods that provides the functionality for chained connec- tions using TLS in a high assurance environment with trusted servers and a public key in- frastructure. A number of methods are formally described and analysed according to multi- ple criteria reflecting both functionality and security requirements. Furthermore, the most promising method is implemented and tested in order to verify that the method is viable in a real-life environment. The proposed solution modifies the TLS protocol through the use of an extension which allows for the distinction between direct and chained connections. The extension which also allows for specifying the structure of chained connections is used in the implementation of a method that creates chained connections by layering TLS connections inside each other. Testing demonstrates that the overhead of the method is negligible and that the method is a viable solution for creating chained connections with mutual authentication using TLS.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Certificats SSL"

1

Blinn, Eric. Managing SQL Server Encryption Certificates. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5151-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Martin, Franck. SSL Certificates HOWTO. Independently Published, 2019.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Syngress, Media. MCDBA SQL Server 7 - Examenes Practicos Certificac. MC Graw Hill, 2000.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Certificats SSL"

1

Hughes, Lawrence E. "SSL and TLS." In Pro Active Directory Certificate Services, 155–75. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7486-6_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Liu, Hui, Yuanyuan Zhang, Hui Wang, Wenbo Yang, Juanru Li, and Dawu Gu. "TagDroid: Hybrid SSL Certificate Verification in Android." In Information and Communications Security, 120–31. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21966-0_9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Vargas, Javier, Franklin Mayorga, David Guevara, and H. David Martinez. "Management of SSL Certificates: Through Dynamic Link Libraries." In Communications in Computer and Information Science, 29–40. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05532-5_3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Parthasarathy, Gaurav, Peter Müller, and Alexander J. Summers. "Formally Validating a Practical Verification Condition Generator." In Computer Aided Verification, 704–27. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81688-9_33.

Повний текст джерела
Анотація:
AbstractA program verifier produces reliable results only if both the logic used to justify the program’s correctness is sound, and the implementation of the program verifier is itself correct. Whereas it is common to formally prove soundness of the logic, the implementation of a verifier typically remains unverified. Bugs in verifier implementations may compromise the trustworthiness of successful verification results. Since program verifiers used in practice are complex, evolving software systems, it is generally not feasible to formally verify their implementation.In this paper, we present an alternative approach: we validate successful runs of the widely-used Boogie verifier by producing a certificate which proves correctness of the obtained verification result. Boogie performs a complex series of program translations before ultimately generating a verification condition whose validity should imply the correctness of the input program. We show how to certify three of Boogie’s core transformation phases: the elimination of cyclic control flow paths, the (SSA-like) replacement of assignments by assumptions using fresh variables (passification), and the final generation of verification conditions. Similar translations are employed by other verifiers. Our implementation produces certificates in Isabelle, based on a novel formalisation of the Boogie language.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Wazan, Ahmad Samer, Romain Laborde, David W. Chadwick, François Barrere, and AbdelMalek Benzekri. "Which Web Browsers Process SSL Certificates in a Standardized Way?" In Emerging Challenges for Security, Privacy and Trust, 432–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01244-0_38.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Maurer, Max-Emanuel, Alexander De Luca, and Tobias Stockinger. "Shining Chrome: Using Web Browser Personas to Enhance SSL Certificate Visualization." In Human-Computer Interaction – INTERACT 2011, 44–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23768-3_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Fiedler, Arno, and Christoph Thiel. "The need of European White Knights for the TLS/SSL Certificate System." In ISSE 2014 Securing Electronic Business Processes, 170–74. Wiesbaden: Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-06708-3_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Cui, Mingxin, Zigang Cao, and Gang Xiong. "How Is the Forged Certificates in the Wild: Practice on Large-Scale SSL Usage Measurement and Analysis." In Lecture Notes in Computer Science, 654–67. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93713-7_62.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

"Working with SSL Certificates." In Mac® Security Bible, 765–75. Indianapolis, IN, USA: Wiley Publishing, Inc., 2011. http://dx.doi.org/10.1002/9781118257739.ch27.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

"Certificate." In Caring for the Customer SS3, 96–100. Routledge, 2012. http://dx.doi.org/10.4324/9780080938622-31.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Certificats SSL"

1

Ghafir, Ibrahim, Vaclav Prenosil, Mohammad Hammoudeh, Liangxiu Han, and Umar Raza. "Malicious SSL Certificate Detection." In ICFNDS '17: International Conference on Future Networks and Distributed Systems. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3102304.3102331.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

C.H. Au, Andrew, Brenda H. S. Lam, Y. C. Kwan, and Angus K. K. Tung. "Pressure Calibration of Quarter-inch Working Standard Microphones by Comparison." In NCSL International Workshop & Symposium. NCSL International, 2021. http://dx.doi.org/10.51843/wsproceedings.2021.19.

Повний текст джерела
Анотація:
The Standards and Calibration Laboratory (SCL) in Hong Kong has developed a system for calibration of quarter-inch working standard (WS3) microphones which automates the measurement process and generates digital calibration certificates (DCC) to meet the growing demand for microphone calibration services in Hong Kong. This paper describes (i) the method of determining the pressure sensitivity of a microphone combination unit from 20 Hz to 20 kHz by the comparison technique in accordance with the International Standard IEC 61094-5, (ii) the measurement model and uncertainty evaluation, and (iii) the automatic system which facilitates the calibration process and generation of a digital calibration certificate.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Simsek, Merve Melis, Tamer Ergun, and Huseyin Temucin. "SSL Test Suite: SSL Certificate Test Public Key Infrastructure." In 2022 30th Signal Processing and Communications Applications Conference (SIU). IEEE, 2022. http://dx.doi.org/10.1109/siu55565.2022.9864693.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Chung, Taejoong, Yabing Liu, David Choffnes, Dave Levin, Bruce MacDowell Maggs, Alan Mislove, and Christo Wilson. "Measuring and Applying Invalid SSL Certificates." In IMC 2016: Internet Measurement Conference. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2987443.2987454.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Manolache, Florin B., and Octavian Rusu. "Automated SSL/TLS Certificate Distribution System." In 2021 20th RoEduNet Conference: Networking in Education and Research (RoEduNet). IEEE, 2021. http://dx.doi.org/10.1109/roedunet54112.2021.9637722.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Souza, Cristian Ferreira de, and Luiz Antônio da Frota Mattos. "Incorporação de Certificados SPKI/SDSI ao Protocolo SSL." In Workshop em Segurança de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2001. http://dx.doi.org/10.5753/sbseg.2001.21281.

Повний текст джерела
Анотація:
Desde 1978 quando Kohnfelder introduziu o conceito de certificados digitais criou-se a falsa idéia de que a única função dos certificados digitais é a de associar um nome a uma chave pública, como ocorre nos certificados X.509. Rivest, Lampson e Carl Ellisson propõem uma nova infra-estrutura de chave pública – SPKI/SDSI (Simple Public Key Infrastructure/Simple Distributed Security Infrastructure), onde é introduzido o conceito de certificados de autorização, espaço local de nomes e abolido o papel da Autoridade Certificadora (CA). Discutiremos a respeito da teoria presente nos certificados SPKI/SDSI e analisaremos as possíveis modificações a serem feitas no protocolo SSL a fim de que suporte a incorporação destes certificados.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Bhiogade, Mittal. "Secure Socket Layer." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2441.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Huang, Lin Shung, Alex Rice, Erling Ellingsen, and Collin Jackson. "Analyzing Forged SSL Certificates in the Wild." In 2014 IEEE Symposium on Security and Privacy (SP). IEEE, 2014. http://dx.doi.org/10.1109/sp.2014.13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Bates, Adam, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Kevin R. B. Butler, and Abdulrahman Alkhelaifi. "Securing SSL Certificate Verification through Dynamic Linking." In CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2660267.2660338.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Gallersdorfer, Ulrich, and Florian Matthes. "TeSC: TLS/SSL-Certificate Endorsed Smart Contracts." In 2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS). IEEE, 2021. http://dx.doi.org/10.1109/dapps52256.2021.00016.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії