Добірка наукової літератури з теми "TLS Certificates"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "TLS Certificates".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "TLS Certificates"
Lapshichyov, Vitaly V. "TLS Certificates of the Tor Network and Their Distinctive Features." International Journal of Systems and Software Security and Protection 10, no. 2 (July 2019): 20–43. http://dx.doi.org/10.4018/ijsssp.2019070102.
Повний текст джерелаFoppe, Lucas, Jeremy Martin, Travis Mayberry, Erik C. Rye, and Lamont Brown. "Exploiting TLS Client Authentication for Widespread User Tracking." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (October 1, 2018): 51–63. http://dx.doi.org/10.1515/popets-2018-0031.
Повний текст джерелаLapshichyov, Vitaly V., and Oleg B. Makarevich. "Detection and identification method of the tor bundle use." Informatization and communication, no. 3 (May 5, 2020): 17–20. http://dx.doi.org/10.34219/2078-8320-2020-11-3-17-20.
Повний текст джерелаPark, Jun-Cheol. "Cookie-Based Identification of the Public Keys of TLS/SSL Certificates." Journal of Korean Institute of Communications and Information Sciences 41, no. 1 (January 31, 2016): 101–3. http://dx.doi.org/10.7840/kics.2015.41.1.101.
Повний текст джерелаAstorga, Jasone, Marc Barcelo, Aitor Urbieta, and Eduardo Jacob. "Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications." Sensors 22, no. 7 (March 27, 2022): 2561. http://dx.doi.org/10.3390/s22072561.
Повний текст джерелаMartynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.
Повний текст джерелаBusygin, A. G., A. S. Konoplev, and M. O. Kalinin. "Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates." Automatic Control and Computer Sciences 50, no. 8 (December 2016): 743–48. http://dx.doi.org/10.3103/s0146411616080290.
Повний текст джерелаWazan, Ahmad Samer, Romain Laborde, David W. Chadwick, Francois Barrere, Abdelmalek Benzekri, Mustafa Kaiiali, and Adib Habbal. "Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker." Security and Communication Networks 2017 (2017): 1–23. http://dx.doi.org/10.1155/2017/6907146.
Повний текст джерелаPan, Jiaye, Yi Zhuang, and Binglin Sun. "Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs." Security and Communication Networks 2019 (October 27, 2019): 1–22. http://dx.doi.org/10.1155/2019/8467081.
Повний текст джерелаLapshichyov, Vitaly, and Oleg Makarevich. "Method for Detecting and Identification of Tor Network Data by Wireshark Analyzer." Voprosy kiberbezopasnosti, no. 4(44) (2021): 73–80. http://dx.doi.org/10.21681/2311-3456-2021-4-73-80.
Повний текст джерелаДисертації з теми "TLS Certificates"
Boinapally, Kashyap. "Security Certificate Renewal Management." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18453.
Повний текст джерелаPetersson, Jakob. "Analysis of Methods for Chained Connections with Mutual Authentication Using TLS." Thesis, Linköpings universitet, Informationskodning, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119455.
Повний текст джерелаBruhner, Carl Magnus, and Oscar Linnarsson. "Relay Racing with X.509 Mayflies : An Analysis of Certificate Replacements and Validity Periods in HTTPS Certificate Logs." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167063.
Повний текст джерелаKlasson, Sebastian, and Nina Lindström. "Longitudinal analysis of the certificate chains of big tech company domains." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178396.
Повний текст джерелаVelthuis, Paul. "New authentication mechanism using certificates for big data analytic tools." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215694.
Повний текст джерелаTraore, Mohamed. "Analyse des biais de RNG pour les mécanismes cryptographiques et applications industrielles." Thesis, Université Grenoble Alpes, 2022. http://www.theses.fr/2022GRALM013.
Повний текст джерелаIn this work, we analyze X.509 SSL/TLS certificates (using RSA encryption and from hundreds of millions of connected devices) looking for anomalies and notably extend the work of Hastings, Fried and Heninger (2016). Our study was carried out on three databases from EFF (2010-2011), ANSSI (2011-2017) and Rapid7 (2017-2021). Several vulnerabilities affecting devices from well-known manufacturers were detected: small moduli (strictly less than 1024 bits), redundant moduli (used by several entities), invalid certificates but still in use, moduli vulnerable to the ROCA attack as well as so-called “GCD-vulnerable” moduli (i.e. moduli having common factors). For the Rapid7 database, counting nearly 600 million certificates (and including those for recent devices), we have identified 1,550,382 certificates whose moduli are GCD-vulnerable, that is 0.27% of the total number. This made it possible to factor 14,765 moduli of 2048 bits which, to our knowledge, has never been done.By analyzing certain GCD-vulnerable moduli, we were able to partially reverse-engineer the modulus generator (of 512 bits) used by certain families of firewalls, which allowed the instantaneous factorization of 42 moduli of 512 bits, corresponding certificates from 8,817 IPv4 addresses.After noting that most of the factored moduli had been generated by the OpenSSL library, we analyzed the source codes and the methods in charge of the RSA key generation process of several versions of this library (covering the period 2005 to 2021). Through experiments on platforms based on ARM processors, where we put ourselves in almost the same conditions as the vulnerable devices identified, we managed to trace the causes of the PGCD-vulnerability
O'Neill, Mark Thomas. "The Security Layer." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/7761.
Повний текст джерелаDickinson, Luke Austin. "Certificate Revocation Table: Leveraging Locality of Reference in Web Requests to Improve TLS Certificate Revocation." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7010.
Повний текст джерелаGustafsson, Josef. "Certificate Transparency in Theory and Practice." Thesis, Linköpings universitet, Databas och informationsteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-125855.
Повний текст джерелаSjöström, Linus, and Carl Nykvist. "How Certificate Transparency Impact the Performance." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-140838.
Повний текст джерелаКниги з теми "TLS Certificates"
Ontario. Energy Act: Revised Statutes of Ontario, 1990, chapter E.16 as amended by 1993, chapter 27, sched.; 1994, chapter 27, s. 81; 1996, chapter 19, s. 20 ; and, the following regulations (as amended) = Loi sur les hydrocarbures : Lois refondues de l'Ontario de 1990, chapitre E.16 tel qu'il est modifié par l'annexe du chap. 27 de 1993; l'art. 81 du chap. 27 de 1994; l'art. 20 du chap. 19 de 1996 ; et, les règlements suivants (tels qu'ils sont modifiés), Certificates (O. Reg. 348/96); Compressed natural gas storage, handling and utilization (O. Reg. 83/97); Fuel oil code (R.R.O. 1990, Reg. 329); Gas utilization code (O. Reg. 546/96); Oil and gas pipeline systems (O. Reg. 157/97); Propane storage, handling and utilization (O. Reg. 514/96). [Toronto]: Queen's Printer for Ontario = Imprimeur de la Reine pour l'Ontario, 2000.
Знайти повний текст джерелаNational Institute National Institute of Standards and Technology. Securing Web Transactions: TLS Server Certificate Management. Independently Published, 2018.
Знайти повний текст джерелаЧастини книг з теми "TLS Certificates"
Hughes, Lawrence E. "Issue and Manage TLS Client Certificates." In Pro Active Directory Certificate Services, 327–58. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7486-6_15.
Повний текст джерелаHughes, Lawrence E. "Issue and Manage TLS Server Certificates." In Pro Active Directory Certificate Services, 275–325. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7486-6_14.
Повний текст джерелаLi, Bingyu, Wei Wang, Lingjia Meng, Jingqiang Lin, Xuezhong Liu, and Congli Wang. "Elaphurus: Ensemble Defense Against Fraudulent Certificates in TLS." In Information Security and Cryptology, 246–59. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42921-8_14.
Повний текст джерелаKampanakis, Panos, and Michael Kallitsis. "Faster Post-Quantum TLS Handshakes Without Intermediate CA Certificates." In Cyber Security, Cryptology, and Machine Learning, 337–55. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07689-3_25.
Повний текст джерелаHughes, Lawrence E. "SSL and TLS." In Pro Active Directory Certificate Services, 155–75. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7486-6_11.
Повний текст джерелаBella, Giampaolo, Rosario Giustolisi, and Gabriele Lenzini. "A Socio-technical Understanding of TLS Certificate Validation." In Trust Management VII, 281–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38323-6_23.
Повний текст джерелаZhu, Liang, Johanna Amann, and John Heidemann. "Measuring the Latency and Pervasiveness of TLS Certificate Revocation." In Passive and Active Measurement, 16–29. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30505-9_2.
Повний текст джерелаRajathi, N., and Meghna Praveen. "Practical Implementation and Analysis of TLS Client Certificate Authentication." In Advances in Intelligent Systems and Computing, 695–703. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8443-5_59.
Повний текст джерелаFiedler, Arno, and Christoph Thiel. "The need of European White Knights for the TLS/SSL Certificate System." In ISSE 2014 Securing Electronic Business Processes, 170–74. Wiesbaden: Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-06708-3_13.
Повний текст джерелаWhelan, Feargal. "Schenectady Putters and Leaving Certificate Ta-Tas: Satirizing Irish Nation-Building in ‘Echo’s Bones’." In Beckett and Modernism, 147–59. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-70374-9_10.
Повний текст джерелаТези доповідей конференцій з теми "TLS Certificates"
Torroledo, Ivan, Luis David Camacho, and Alejandro Correa Bahnsen. "Hunting Malicious TLS Certificates with Deep Neural Networks." In CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3270101.3270105.
Повний текст джерелаPersiano, Pino, and Ivan Visconti. "User privacy issues regarding certificates and the TLS protocol." In the 7th ACM conference. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/352600.352609.
Повний текст джерелаSakurai, Yuji, Takuya Watanabe, Tetsuya Okuda, Mitsuaki Akiyama, and Tatsuya Mori. "Discovering HTTPSified Phishing Websites Using the TLS Certificates Footprints." In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2020. http://dx.doi.org/10.1109/eurospw51379.2020.00077.
Повний текст джерелаMatsumoto, Stephanos, and Raphael M. Reischuk. "Certificates-as-an-Insurance: Incentivizing Accountability in SSL/TLS." In Workshop on Security of Emerging Networking Technologies. Reston, VA: Internet Society, 2015. http://dx.doi.org/10.14722/sent.2015.23009.
Повний текст джерелаNawrocki, Marcin, Pouyan Fotouhi Tehrani, Raphael Hiesgen, Jonas Mücke, Thomas C. Schmidt, and Matthias Wählisch. "On the interplay between TLS certificates and QUIC performance." In CoNEXT '22: The 18th International Conference on emerging Networking EXperiments and Technologies. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3555050.3569123.
Повний текст джерелаFerreira, Ana, Rosario Giustolisi, Jean-Louis Huynen, Vincent Koenig, and Gabriele Lenzini. "Studies in Socio-technical Security Analysis: Authentication of Identities with TLS Certificates." In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2013. http://dx.doi.org/10.1109/trustcom.2013.190.
Повний текст джерелаXia, Wei, Wei Wang, Xin He, Gang Xiong, Gaopeng Gou, Zhenzhen Li, and Zhen Li. "Old Habits Die Hard: A Sober Look at TLS Client Certificates in the Real World." In 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2021. http://dx.doi.org/10.1109/trustcom53373.2021.00029.
Повний текст джерелаWalsh, Kevin. "TLS with trustworthy certificate authorities." In 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, 2016. http://dx.doi.org/10.1109/cns.2016.7860543.
Повний текст джерелаUkrop, Martin, Lydia Kraus, Vashek Matyas, and Heider Ahmad Mutleq Wahsheh. "Will you trust this TLS certificate?" In ACSAC '19: 2019 Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3359789.3359800.
Повний текст джерелаHageman, Kaspar, Egon Kidmose, René Hansen, and Jens Pedersen. "Can a TLS Certificate Be Phishy?" In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010516600380049.
Повний текст джерелаЗвіти організацій з теми "TLS Certificates"
Sethi, M., J. Preuß Mattsson, and S. Turner. Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods. RFC Editor, February 2022. http://dx.doi.org/10.17487/rfc9191.
Повний текст джерелаSerhrouchni, A., and H. Labiod. TLS Authentication Using Intelligent Transport System (ITS) Certificates. Edited by M. Msahli, N. Cam-Winget, and W. Whyte. RFC Editor, September 2020. http://dx.doi.org/10.17487/rfc8902.
Повний текст джерелаThakore, D. Transport Layer Security (TLS) Authorization Using Digital Transmission Content Protection (DTCP) Certificates. RFC Editor, July 2015. http://dx.doi.org/10.17487/rfc7562.
Повний текст джерелаGhedini, A., and V. Vasiliev. TLS Certificate Compression. RFC Editor, December 2020. http://dx.doi.org/10.17487/rfc8879.
Повний текст джерелаSaint-Andre, P., and J. Hodges. Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS). RFC Editor, March 2011. http://dx.doi.org/10.17487/rfc6125.
Повний текст джерелаAkram, Mehwish, William C. Barker, Rob Clatterbuck, Donna Dodson, Brandon Everhart, Jane Gilbert, William Haag, et al. Securing web transactions TLS server certificate management. Gaithersburg, MD: National Institute of Standards and Technology, June 2020. http://dx.doi.org/10.6028/nist.sp.1800-16.
Повний текст джерелаPettersen, Y. The Transport Layer Security (TLS) Multiple Certificate Status Request Extension. RFC Editor, June 2013. http://dx.doi.org/10.17487/rfc6961.
Повний текст джерелаCampbell, B., J. Bradley, N. Sakimura, and T. Lodderstedt. OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens. RFC Editor, February 2020. http://dx.doi.org/10.17487/rfc8705.
Повний текст джерелаShoemaker, R. B. Automated Certificate Management Environment (ACME) TLS Application‑Layer Protocol Negotiation (ALPN) Challenge Extension. RFC Editor, February 2020. http://dx.doi.org/10.17487/rfc8737.
Повний текст джерелаHousley, R. TLS 1.3 Extension for Certificate-Based Authentication with an External Pre-Shared Key. RFC Editor, March 2020. http://dx.doi.org/10.17487/rfc8773.
Повний текст джерела