Journal articles on the topic 'Certificats SSL/TLS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 36 journal articles for your research on the topic 'Certificats SSL/TLS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lapshichyov, Vitaly V. "TLS Certificates of the Tor Network and Their Distinctive Features." International Journal of Systems and Software Security and Protection 10, no. 2 (2019): 20–43. http://dx.doi.org/10.4018/ijsssp.2019070102.
Full textMohit, Thodupunuri. "The Right Way to Manage SSL/TLS Certificates in Modern Applications and Infrastructure." European Journal of Advances in Engineering and Technology 11, no. 3 (2024): 30–37. https://doi.org/10.5281/zenodo.15607021.
Full textFoppe, Lucas, Jeremy Martin, Travis Mayberry, Erik C. Rye, and Lamont Brown. "Exploiting TLS Client Authentication for Widespread User Tracking." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (2018): 51–63. http://dx.doi.org/10.1515/popets-2018-0031.
Full textXing, Qianqian, Xiaofeng Wang, Xinyue Xu, et al. "BRT: An Efficient and Scalable Blockchain-Based Revocation Transparency System for TLS Connections." Sensors 23, no. 21 (2023): 8816. http://dx.doi.org/10.3390/s23218816.
Full textPark, Jun-Cheol. "Cookie-Based Identification of the Public Keys of TLS/SSL Certificates." Journal of Korean Institute of Communications and Information Sciences 41, no. 1 (2016): 101–3. http://dx.doi.org/10.7840/kics.2015.41.1.101.
Full textCueva Hurtado, Mario E., and Diego Javier Alvarado Sarango. "Análisis de Certificados SSL/TLS gratuitos y su implementación como Mecanismo de seguridad en Servidores de Aplicación." Enfoque UTE 8, no. 1 (2017): 273–86. http://dx.doi.org/10.29019/enfoqueute.v8n1.128.
Full textLapshichyov, Vitaly V., and Oleg B. Makarevich. "Detection and identification method of the tor bundle use." Informatization and communication, no. 3 (May 5, 2020): 17–20. http://dx.doi.org/10.34219/2078-8320-2020-11-3-17-20.
Full textTian, Cong, Chu Chen, Zhenhua Duan, and Liang Zhao. "Differential Testing of Certificate Validation in SSL/TLS Implementations." ACM Transactions on Software Engineering and Methodology 28, no. 4 (2019): 1–37. http://dx.doi.org/10.1145/3355048.
Full textMartynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.
Full textPark, Hun Myoung. "The Pitfalls of the Certificate-Based User Authentication Scheme on Korean Public Websites." Journal of Cases on Information Technology 26, no. 1 (2024): 1–19. http://dx.doi.org/10.4018/jcit.355015.
Full textRazumov, Pavel, Larissa Cherckesova, Elena Revyakina, Sergey Morozov, Dmitry Medvedev, and Andrei Lobodenko. "Ensuring the security of web applications operating on the basis of the SSL/TLS protocol." E3S Web of Conferences 402 (2023): 03028. http://dx.doi.org/10.1051/e3sconf/202340203028.
Full textAnelia, Syifa Sabrina, Jayanta Jayanta, and Bayu Hananto. "Uji Penetrasi Server Universitas PQR Menggunakan Metode National Institute Of Standards And Technology (NIST SP 800-115)." Jurnal Ilmu Teknik dan Komputer 7, no. 1 (2023): 34. http://dx.doi.org/10.22441/jitkom.2023.v7i1.005.
Full textPeñarrieta, David, Marlon Navia, Eliana Garcia, and Dannyll Zambrano. "Evaluación de la Seguridad de Certificados Digitales en las Plataformas Financieras de Ecuador." Revista Tecnológica - ESPOL 36, no. 2 (2024): 174–89. https://doi.org/10.37815/rte.v36n2.1222.
Full textWang, Yingjie, Guangquan Xu, Xing Liu, et al. "Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis." Journal of Systems and Software 167 (September 2020): 110609. http://dx.doi.org/10.1016/j.jss.2020.110609.
Full textSun, Yuteng, Joyanta Debnath, Wenzheng Hong, Omar Chowdhury, and Sze Yiu Chau. "On the Unnecessary Complexity of Names in X.509 and Their Impact on Implementations." Proceedings of the ACM on Software Engineering 2, FSE (2025): 1454–74. https://doi.org/10.1145/3715785.
Full textLapshichyov, Vitaly, and Oleg Makarevich. "Method for Detecting and Identification of Tor Network Data by Wireshark Analyzer." Voprosy kiberbezopasnosti, no. 4(44) (2021): 73–80. http://dx.doi.org/10.21681/2311-3456-2021-4-73-80.
Full textAsratian, R. E. "Secure Network Channel for Web Services based on SSL/TLS Technology in a Linux Environment." Programmnaya Ingeneria 13, no. 3 (2022): 124–31. http://dx.doi.org/10.17587/prin.13.124-131.
Full textPan, Jiaye, Yi Zhuang, and Binglin Sun. "Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs." Security and Communication Networks 2019 (October 27, 2019): 1–22. http://dx.doi.org/10.1155/2019/8467081.
Full textSyaifudin, Moh Rizki, Mohamad Ali Murtadho, Moh Shohibul Wafa, and Mukhamad Masrur. "Analisis Keamanan Website Kampus UNIPDU Melalui Metode <i>Vulnerability Assessment (VA)</i> dengan Menggunakan <i>Tools Acunetix</i>." Komputa : Jurnal Ilmiah Komputer dan Informatika 14, no. 1 (2025): 21–32. https://doi.org/10.34010/komputa.v14i1.14693.
Full textMd Kamrul Hasan Chy. "Securing the web: Machine learning's role in predicting and preventing phishing attacks." International Journal of Science and Research Archive 13, no. 1 (2024): 1004–11. http://dx.doi.org/10.30574/ijsra.2024.13.1.1770.
Full textNamo-Ochoa, Angel, Eduardo Portilla-Cosar, Fernando Sierra-Liñan, and Michael Cabanillas-Carbonell. "Risk analysis and prevention in computer security in institutional servers, a systematic review of the literature." Bulletin of Electrical Engineering and Informatics 13, no. 3 (2024): 2142–53. http://dx.doi.org/10.11591/eei.v13i3.6093.
Full textDarlington, Emerson, Fanxing (Amy) Fei, Isabelle Feigenberg, et al. "SPARK: Exposing Vulnerabilities in Collaborative Display Systems and Session-Key Exposure." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 53–61. https://doi.org/10.34190/iccws.20.1.3373.
Full textD, Vishal. "High-Performance Network Intrusion Detection Engine." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40768.
Full textSanat Talwar. "Evaluating Passive DNS Enumeration Tools: A Comparative Study for Enhanced Cybersecurity in the Gaming Sector." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 2478–91. https://doi.org/10.32628/cseit24106119.
Full textKang, James Jin, Kiran Fahd, and Sitalakshmi Venkatraman. "Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity." Cryptography 2, no. 4 (2018): 38. http://dx.doi.org/10.3390/cryptography2040038.
Full textJournal, Baghdad Science. "The Impact of Operating System on Bandwidth in Open VPN Technology." Baghdad Science Journal 13, no. 1 (2016): 204–11. http://dx.doi.org/10.21123/bsj.13.1.204-211.
Full textJornet-Monteverde, Julio Antonio, and Juan José Galiana-Merino. "Low-Cost Conversion of Single-Zone HVAC Systems to Multi-Zone Control Systems Using Low-Power Wireless Sensor Networks." Sensors 20, no. 13 (2020): 3611. http://dx.doi.org/10.3390/s20133611.
Full textVasyl, Lytvyn, Vysotska Victoria, Kuchkovskiy Volodymyr, et al. "DEVELOPMENT OF THE SYSTEM TO INTEGRATE AND GENERATE CONTENT CONSIDERING THE CRYPTOCURRENT NEEDS OF USERS." Eastern-European Journal of Enterprise Technologies 1, no. 2 (97) (2019): 18–39. https://doi.org/10.15587/1729-4061.2019.154709.
Full textNie, Pengbo, Chengcheng Wan, Jiayu Zhu, Ziyi Lin, Yuting Chen, and Zhendong Su. "Coverage-Directed Differential Testing of X.509 Certificate Validation in SSL/TLS Implementations." ACM Transactions on Software Engineering and Methodology, April 19, 2022. http://dx.doi.org/10.1145/3510416.
Full textMario, E. Cueva Hurtado, and Javier Alvarado Sarango Diego. "Analysis of free SSL/TLS Certificates and their implementation as Security Mechanism in Application Servers." 8, no. 1 (2017): 273–86. https://doi.org/10.29019/enfoqueute.v8n1.128.
Full textLiu, Anyi, Ali Alqazzaz, Hua Ming, and Balakrishnan Dharmalingam. "IoTVerif: Automatic Verification of SSL/TLS Certificate for IoT Applications." IEEE Access, 2020, 1. http://dx.doi.org/10.1109/access.2019.2961918.
Full textHu, Qinwen, Muhammad Rizwan Asghar, and Nevil Brownlee. "A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations." Journal of Computer Security, November 27, 2020, 1–26. http://dx.doi.org/10.3233/jcs-200070.
Full textMaimon, David, Yubao Wu, Michael McGuire, Nicholas Stubler, and Zijie Qui. "SSL/TLS Certificates and Their Prevalence on the Dark Web (First Report)." CrimRxiv, November 12, 2019. http://dx.doi.org/10.21428/cb6ab371.0fdb44f6.
Full textNilekh, Chaudhari. "A Cloud Security Approach for Data at Rest Using FPE." February 28, 2015. https://doi.org/10.5121/ijccsa.2015.5102.
Full textAngel, Namo-Ochoa, Portilla-Cosar Eduardo, Sierra-Liñan Fernando, and Cabanillas-Carbonell Michael. "Risk analysis and prevention in computer security in institutional servers, a systematic review of the literature." Bulletin of Electrical Engineering and Informatics (BEEI) 13, no. 3 (2024). https://doi.org/10.11591/eei.v13i3.6093.
Full textIliyas, Dr Mohammed. "The Everyday Role of Cryptography: Securing Digital Life through Encryption and Authentication." Indian Journal of Computer Science and Technology, June 2, 2025, 224–26. https://doi.org/10.59256/indjcst.20250402030.
Full text