To see the other types of publications on this topic, follow the link: Certificats SSL.

Journal articles on the topic 'Certificats SSL'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Certificats SSL.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lapshichyov, Vitaly V. "TLS Certificates of the Tor Network and Their Distinctive Features." International Journal of Systems and Software Security and Protection 10, no. 2 (2019): 20–43. http://dx.doi.org/10.4018/ijsssp.2019070102.

Full text
Abstract:
This article presents the results of an experimental study of the properties of SSL/TLS certificates of an anonymous Tor network, based on which it is concluded that there are several features that differ from other SSL/TLS certificates. At present, in the scientific literature and in the documentation of U.S. National Security Agency, and the U.K. Government Communications Headquarters devoted to the identification of Tor network traffic, two signs of SSL/TLS certificates are indicated - the name of the certificate subject, as well as the port of the certificate transmission and network conne
APA, Harvard, Vancouver, ISO, and other styles
2

Mohit, Thodupunuri. "The Right Way to Manage SSL/TLS Certificates in Modern Applications and Infrastructure." European Journal of Advances in Engineering and Technology 11, no. 3 (2024): 30–37. https://doi.org/10.5281/zenodo.15607021.

Full text
Abstract:
SSL/TLS certificates are foundational to securing modern application and infrastructure communications. Yet despite their ubiquity, poor certificate management remains a leading cause of service disruptions, security breaches, and compliance failures. As systems become more distributed—spanning containerized workloads, service meshes, and hybrid clouds—the challenge of managing certificate lifecycles grows exponentially. Static provisioning, hardcoded secrets, and manual renewals no longer scale in environments demanding agility and automation. This article explores best practices
APA, Harvard, Vancouver, ISO, and other styles
3

Suwayeb, Abdulaziz Mahmud, and Mahmoud Mohamed Elsaghayer. "Using Elliptic-Curve to Implements SSL Certificate Derives from CSR to Make Secure Connection between Server and Client." International Science and Technology Journal 36, no. 1 (2025): 1–11. https://doi.org/10.62341/amuc1218.

Full text
Abstract:
The paper discusses the implementation of Secure Sockets Layer (SSL) certificates, which are obtained from Certificate Signing Requests (CSRs), to facilitate secure connections between servers and clients. SSL serves as an essential encryption protocol that guarantees the confidentiality, integrity, and authenticity of data transmitted over networks, thus playing a vital role in safeguarding online transactions and communications. The paper outlines SSL process, which encompasses key components such as the key generation, and data encryption. Additionally, it highlights the importance of the R
APA, Harvard, Vancouver, ISO, and other styles
4

Minakhvatov, Bulat Rafkatovich, and Vladislav Aleksandrovich Strigunov. "SSL CERTIFICATE." Problemy sovershenstvovaniya organizatsii proizvodstva i upravleniya promyshlennymi predpriyatiyami: Mezhvuzovskii sbornik nauchnykh trudov, no. 1 (2021): 217–22. http://dx.doi.org/10.46554/op-mie-2021.1-pp.217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Halder, Ratna, Dipanjan Das Roy, and Dongwan Shin. "A Blockchain-Based Decentralized Public Key Infrastructure Using the Web of Trust." Journal of Cybersecurity and Privacy 4, no. 2 (2024): 196–222. http://dx.doi.org/10.3390/jcp4020010.

Full text
Abstract:
Internet applications rely on Secure Socket Layer (SSL)/Transport Security Layer (TSL) certifications to establish secure communication. However, the centralized nature of certificate authorities (CAs) poses a risk, as malicious third parties could exploit the CA to issue fake certificates to malicious web servers, potentially compromising the privacy and integrity of user data. In this paper, we demonstrate how the utilization of decentralized certificate verification with blockchain technology can effectively address and mitigate such attacks. We present a decentralized public key infrastruc
APA, Harvard, Vancouver, ISO, and other styles
6

Cueva Hurtado, Mario E., and Diego Javier Alvarado Sarango. "Análisis de Certificados SSL/TLS gratuitos y su implementación como Mecanismo de seguridad en Servidores de Aplicación." Enfoque UTE 8, no. 1 (2017): 273–86. http://dx.doi.org/10.29019/enfoqueute.v8n1.128.

Full text
Abstract:
La seguridad en la capa de aplicación (SSL), proporciona la confidencialidad, integridad y autenticidad de los datos, entre dos aplicaciones que se comunican entre sí. El presente artículo es el resultado de haber implementado certificados SSL / TLS gratuitos en servidores de aplicación, determinando las características relevantes que debe tener un certificado SSL/TLS, la Autoridad certificadora que lo emita. Se realiza un análisis de las vulnerabilidades en los servidores web y se establece un canal cifrado de comunicaciones con el fin de proteger de ataques como hombre en el medio, phising y
APA, Harvard, Vancouver, ISO, and other styles
7

Foppe, Lucas, Jeremy Martin, Travis Mayberry, Erik C. Rye, and Lamont Brown. "Exploiting TLS Client Authentication for Widespread User Tracking." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (2018): 51–63. http://dx.doi.org/10.1515/popets-2018-0031.

Full text
Abstract:
Abstract TLS, and SSL before it, has long supported the option for clients to authenticate to servers using their own certificates, but this capability has not been widely used. However, with the development of its Push Notification Service, Apple has deployed this technology on millions of devices for the first time. Wachs et al. [42] determined iOS client certificates could be used by passive network adversaries to track individual devices across the internet. Subsequently, Apple has patched their software to fix this vulnerability. We show these countermeasures are not effective by demonstr
APA, Harvard, Vancouver, ISO, and other styles
8

Xing, Qianqian, Xiaofeng Wang, Xinyue Xu, et al. "BRT: An Efficient and Scalable Blockchain-Based Revocation Transparency System for TLS Connections." Sensors 23, no. 21 (2023): 8816. http://dx.doi.org/10.3390/s23218816.

Full text
Abstract:
Log-based public key infrastructure(PKI) refers to a robust class of CA-attack-resilient PKI that enhance transparency and accountability in the certificate revocation and issuance process by compelling certificate authorities (CAs) to submit revocations to publicly and verifiably accessible logs. However, log-based PKIs suffer from a reliance on centralized and consistent sources of information, rendering them susceptible to split-world attacks, and they regrettably fail to provide adequate incentives for recording or monitoring CA behavior. Blockchain-based PKIs address these limitations by
APA, Harvard, Vancouver, ISO, and other styles
9

Lapshichyov, Vitaly V., and Oleg B. Makarevich. "Detection and identification method of the tor bundle use." Informatization and communication, no. 3 (May 5, 2020): 17–20. http://dx.doi.org/10.34219/2078-8320-2020-11-3-17-20.

Full text
Abstract:
This paper presents the result of author’s research aimed at developing a detecting and identifying method of the Tor Bundle use in data transmission networks, in particular, on the Internet. Based on these characteristics, an algorithm has been developed that allows legitimate blocking of user access to a global network by a popular anonymizer. The subject of the study was an SSL/TLS encryption certificate, which is transmitted by the Tor network server to the user of the Tor Bundle and which contains the set of data necessary for its identification during the implementation of the TLS “hands
APA, Harvard, Vancouver, ISO, and other styles
10

Park, Hun Myoung. "The Pitfalls of the Certificate-Based User Authentication Scheme on Korean Public Websites." Journal of Cases on Information Technology 26, no. 1 (2024): 1–19. http://dx.doi.org/10.4018/jcit.355015.

Full text
Abstract:
The Korean government has employed a certificate-based user authentication scheme powered by Internet Explorer and ActiveX plug-ins for the past two decades. Users must obtain accredited digital certificates, install all required plug-ins on their machines, and undergo all user authentication procedures. Most clients mistakenly take a series of authentication procedures for granted and unwittingly make copies of security code cards, store accredited digital certificates on hard disks, and mechanically click “Yes” or “OK”. Public websites lack cross-platform and cross-browser compatibility and
APA, Harvard, Vancouver, ISO, and other styles
11

Sebastian, S., and R. S. Chouhan. "Privacy Preservation and Data Security on Internet Using Mutual Ssl." Oriental journal of computer science and technology 10, no. 1 (2017): 249–54. http://dx.doi.org/10.13005/ojcst/10.01.34.

Full text
Abstract:
It is essential to maintain a ratio between privacy protection and knowledge discovery. Internet users depend daily on SSL/HTPS for secure communication on internet. Over the years, many attacks on the certificate trust model it uses have been evolved. Mutual SSL authentication shared verification alludes to two parties validating each other through checking the digital certificate so that both sides are guaranteed of the other’s identity. In technical terms, it alludes to a client (web program or client application) authenticate themselves to the server (server application) and that server li
APA, Harvard, Vancouver, ISO, and other styles
12

Park, Jun-Cheol. "Cookie-Based Identification of the Public Keys of TLS/SSL Certificates." Journal of Korean Institute of Communications and Information Sciences 41, no. 1 (2016): 101–3. http://dx.doi.org/10.7840/kics.2015.41.1.101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Kumar, Rajesh, and K. Rekha. "Strengthening SSL Security with attribute certificate." EAI Endorsed Transactions on Cloud Systems 3, no. 11 (2018): 154465. http://dx.doi.org/10.4108/eai.11-4-2018.154465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Fedkova, N. A., and D. A. Fedkov. "Development of PowerShell Scripts for Automating Windows OS Administration Processes. Automating the Process of Creating and Distributing SSL Certificates to Servers." Vestnik NSU. Series: Information Technologies 20, no. 1 (2022): 81–96. http://dx.doi.org/10.25205/1818-7900-2022-20-1-81-96.

Full text
Abstract:
The article describes the process of automating Windows administration, in particular, automating the process of creating and distributing SSL certificates to servers. The built-in command shell PowerShell is used for development. Theoretical aspects of the subject are given: the concept of SSL certificates, the purpose of Vault storage and Consul service. The results of development in the form of code listings are presented.
APA, Harvard, Vancouver, ISO, and other styles
15

Meyer, Helen. "Securing intranet data with SSL client certificates." Computers & Security 16, no. 4 (1997): 334. http://dx.doi.org/10.1016/s0167-4048(97)80213-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Komalasari, Dinny, Tri Basuki Kurniawan, Deshinta Arrova Dewi, Mohd Zaki Zakaria, Zubaile Abdullah, and Alde Alanda. "Phishing Domain Detection Using Machine Learning Algorithms." International Journal on Advanced Science, Engineering and Information Technology 15, no. 1 (2025): 318–27. https://doi.org/10.18517/ijaseit.15.1.12553.

Full text
Abstract:
Phishing, a prevalent cyber threat, continues to jeopardize sensitive information by exploiting the vulnerabilities of digital platforms. This research investigates the escalating danger of phishing attacks, focusing on the creation of deceptive websites known as phishing domains. Leveraging machine learning algorithms, particularly supervised and unsupervised learning techniques, the study aims to proactively identify and classify these malicious domains by analyzing diverse factors like domain names, online content, SSL certificates, and historical data. The proposed solution involves the de
APA, Harvard, Vancouver, ISO, and other styles
17

A. Karunamurthy, Dr. "SECURE AND SCALABLE WORDPRES DEPLOYMENT ON AWS WITH RDS." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–9. https://doi.org/10.55041/isjem04077.

Full text
Abstract:
Abstract This paper digital landscape, ensuring high availability, scalability, and security for web applications is crucial. This project focuses on deploying a secure and scalable WordPress website on Amazon Web Services (AWS) using industry best practices. By leveraging AWS services such as EC2, Auto Scaling, RDS, S3, VPC, IAM, and Security Groups, this deployment achieves high performance, reliability, and security. The architecture includes Amazon EC2 instances running WordPress in an Auto Scaling Group, ensuring seamless horizontal scalability. Amazon RDS is used for the MySQL database,
APA, Harvard, Vancouver, ISO, and other styles
18

Au, Andrew C. H., Brenda H. S. Lam, Y. C. Kwan, and Angus K. K. Tung. "Pressure Calibration of Quarter-Inch Working Standard Microphones by Comparison." NCSLI Measure 14, no. 1 (2022): 40–48. http://dx.doi.org/10.51843/measure.14.1.7.

Full text
Abstract:
The Standards and Calibration Laboratory (SCL) in Hong Kong has developed a system for calibration of quar-ter-inch working standard (WS3) microphones which automates the measurement process and generates digital calibration certificates (DCCs) to meet the growing demand for microphone calibration services in Hong Kong. This paper describes (i) the method of determining the pressure sensitivity of a microphone combination unit from 20 Hz to 20 kHz by the comparison technique in accordance with the International Standard IEC 61094-5, (ii) the measurement model and uncertainty evaluation, and (i
APA, Harvard, Vancouver, ISO, and other styles
19

Anelia, Syifa Sabrina, Jayanta Jayanta, and Bayu Hananto. "Uji Penetrasi Server Universitas PQR Menggunakan Metode National Institute Of Standards And Technology (NIST SP 800-115)." Jurnal Ilmu Teknik dan Komputer 7, no. 1 (2023): 34. http://dx.doi.org/10.22441/jitkom.2023.v7i1.005.

Full text
Abstract:
Abstract -- Ancaman keamanan serangan siber terjadi di beberapa universitas. Data penting yang terletak pada server organisasi bisa saja diretas oleh orang yang tidak berhak. Salah satu cara menghindari peretasan adalah menutup celah-celah keamanan yang dimiliki sistem. Sebelum menutup celah keamanan, tentu harus diketahui celah keamanannya, dengan melakukan pengujian seperti yang dilakukan oleh peretas, namun dengan prosedur yang telah disetujui. Pada penelitian ini dilakukan pengujian penetrasi yang bertujuan menguji kerentanan serta menemukan celah keamanan yang ada pada server universitas,
APA, Harvard, Vancouver, ISO, and other styles
20

Xu, Da Wei. "The Implementation of Mobile Agent System Based X.509 Certificate." Advanced Materials Research 403-408 (November 2011): 1270–73. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1270.

Full text
Abstract:
The paper introduces the design objective and design scheme of mobile agent-based X.509 certificate management system, and describes the key technologies such as encryption, the certificate processing format and coding, secure communication protocols such as SSL in detaile.
APA, Harvard, Vancouver, ISO, and other styles
21

Kappenberger, Reiner. "The true cost of self-signed SSL certificates." Computer Fraud & Security 2012, no. 9 (2012): 14–16. http://dx.doi.org/10.1016/s1361-3723(12)70092-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Peñarrieta, David, Marlon Navia, Eliana Garcia, and Dannyll Zambrano. "Evaluación de la Seguridad de Certificados Digitales en las Plataformas Financieras de Ecuador." Revista Tecnológica - ESPOL 36, no. 2 (2024): 174–89. https://doi.org/10.37815/rte.v36n2.1222.

Full text
Abstract:
This article presents a diagnosis of the application of digital certificates in the virtual banking services of Ecuador. The importance of this topic is based on the increasing attacks on electronic services of financial platforms in the region and the world, due to the exploitation of vulnerabilities discovered by cybercriminals in the weak application of cipher suites. The objective of the research is to show the level of security of these online banking portals (individuals), in the applicability of SSL/TLS protocols, with their respective cipher suites on the server side. Eighteen financia
APA, Harvard, Vancouver, ISO, and other styles
23

Sun, Yuteng, Joyanta Debnath, Wenzheng Hong, Omar Chowdhury, and Sze Yiu Chau. "On the Unnecessary Complexity of Names in X.509 and Their Impact on Implementations." Proceedings of the ACM on Software Engineering 2, FSE (2025): 1454–74. https://doi.org/10.1145/3715785.

Full text
Abstract:
TheX.509 Public Key Infrastructure (PKI) provides a cryptographically verifiable mechanism for authenticating a binding of an entity’s public-key with its identity, presented in a tamper-proof digital certificate. This often serves as a foundational building block for achieving different security guarantees in many critical applications and protocols (e.g., SSL/TLS). Identities in the context of X.509 PKI are often captured as names, which are encoded in certificates as composite records with different optional fields that can store various types of string values (e.g., ASCII, UTF8). Although
APA, Harvard, Vancouver, ISO, and other styles
24

Tian, Cong, Chu Chen, Zhenhua Duan, and Liang Zhao. "Differential Testing of Certificate Validation in SSL/TLS Implementations." ACM Transactions on Software Engineering and Methodology 28, no. 4 (2019): 1–37. http://dx.doi.org/10.1145/3355048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

B, Risma, Azhar Azhar, and Makhdalena Makhdalena. "IMPLEMENTASI KERANGKA KUALIFIKASI NASIONAL INDONESIA DI LEMBAGA KURSUS UNIVERSAL SKILL PEKANBARU." Jurnal Manajemen Pendidikan Penelitian Kualitatif 2, no. 2 (2018): 242. http://dx.doi.org/10.31258/jmppk.2.2.p.242-247.

Full text
Abstract:
This research is described the implementation of National QualificationFramework at Universal Skill Course in Pekanbaru about the curriculum concept and theregistration of new students process, educational processes, competence exams until the receivesof the certificates. This research used the qualitative approach, the data of research got by theleader of Universal Skill course, tutor, admission, and students. The data collectives got bytriangulation technique through observation, interviews, and documentations research. The reportof the research shows some indicators, they are 1) the new stu
APA, Harvard, Vancouver, ISO, and other styles
26

Thurimella, Ramakrishna, and William Mitchell. "Cloak and Dagger." International Journal of Information Security and Privacy 3, no. 3 (2009): 55–75. http://dx.doi.org/10.4018/jisp.2009100704.

Full text
Abstract:
One of the most devastating forms of attack on a computer is when the victim doesn’t even know an attack occurred. After some background material, various forms of man in the middle (MITM) attacks, including ARP spoofing, fake SSL certificates, and bypassing SSL are explored. Next, rootkits and botnets, two key pieces of crimeware, are introduced and analyzed. Finally, general strategies to protect against such attacks are suggested.
APA, Harvard, Vancouver, ISO, and other styles
27

Antonishyn, Mykhailo. "Four ways to bypass Android SSL. Verification and Certificate Pinning." Transfer of Innovative Technologies 3, no. 1 (2020): 96–99. http://dx.doi.org/10.32347/tit2020.31.0302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Razumov, Pavel, Larissa Cherckesova, Elena Revyakina, Sergey Morozov, Dmitry Medvedev, and Andrei Lobodenko. "Ensuring the security of web applications operating on the basis of the SSL/TLS protocol." E3S Web of Conferences 402 (2023): 03028. http://dx.doi.org/10.1051/e3sconf/202340203028.

Full text
Abstract:
SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications are designed to provide authentication based on a public key certificate, as well as generating a secure session key and traffic privacy based on a symmetric key. Today, a large number of e-commerce applications such as stock trading, banking, shopping and gaming rely on the robustness of the SSL/TLS protocol. Recently, a potential threat known as a Man-in-the-Middle or main-in-the-middle (MITM) attack has been used by attackers to attack SSL/TLS-enabled web applications, especially when users want to connect to an
APA, Harvard, Vancouver, ISO, and other styles
29

Seniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle, and Fahmi Fahmi. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (2021): 507. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp507-515.

Full text
Abstract:
Currently there is no method, feature, or ability in securing data transmission in microcontroller systems and applications with client-server scheme communication, while major modern computer systems using secure socket layer (SSL) for establishing secure communication. However, ESP espressif based microcontroller has supported SSL communication to secure data transmission, but only works on the Wi-Fi network. A single-board computer based embedded system has fully supported SSL communication, but it costs a very high price. On the other hand, STM32F103 microcontrollers with a very affordable
APA, Harvard, Vancouver, ISO, and other styles
30

Seniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle, and Fahmi Fahm. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (2021): 507–15. https://doi.org/10.11591/ijeecs.v22.i1.pp507-515.

Full text
Abstract:
Currently there is no method, feature, or ability in securing data transmission in microcontroller systems and applications with client-server scheme communication, while major modern computer systems using secure socket layer (SSL) for establishing secure communication. However, ESP espressif based microcontroller has supported SSL communication to secure data transmission, but only works on the Wi-Fi network. A single-board computer based embedded system has fully supported SSL communication, but it costs a very high price. On the other hand, STM32F103 microcontrollers with a very affordable
APA, Harvard, Vancouver, ISO, and other styles
31

Dakov, Stanislav, and Anna Malinova. "A SURVEY OF E-COMMERCE SECURITY THREATS AND SOLUTIONS." Proceedings of CBU in Natural Sciences and ICT 2 (October 24, 2021): 1–9. http://dx.doi.org/10.12955/pns.v2.135.

Full text
Abstract:
E-commerce security is part of the Web security problems that arise in all business information systems that operate over the Internet. However, in e-commerce security, the dimensions of web security – secrecy, integrity, and availability-are focused on protecting the consumer’s and e-store site’s assets from unauthorized access, use, alteration, or destruction. The paper presents an overview of the recent security issues in e-commerce applications and the usual points the attacker can target, such as the client (data, session, identity); the client computer; the network connection between the
APA, Harvard, Vancouver, ISO, and other styles
32

KATO, Hiroya, Shuichiro HARUTA, and Iwao SASASE. "Android Malware Detection Scheme Based on Level of SSL Server Certificate." IEICE Transactions on Information and Systems E103.D, no. 2 (2020): 379–89. http://dx.doi.org/10.1587/transinf.2019edp7119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Hermawan, Tommy. "Legal Certainty To Double Land Statement Letter (Skl) Holders In Land Boarders (Study Case In Teteilanan Village, South Barito Regency, Center Kalimantan)." Pancasila and Law Review 1, no. 2 (2021): 137. http://dx.doi.org/10.25041/plr.v1i2.2157.

Full text
Abstract:
This research was ⅿotivateⅾ by the nսⅿber of ⅼanⅾⅾispսtes that occսrreⅾ in Centraⅼ Kaⅼiⅿantan which was caսseⅾ by the existence of a ⅾoսbⅼe ⅼanⅾ Certificate (SKT) issսeⅾ by the Viⅼⅼage Heaⅾ. This stսⅾy raises a ⅼanⅾⅾispսte that occսrreⅾ between party X anⅾ a paⅼⅿ oiⅼ coⅿpany where each party owns an SKT on ⅼanⅾ objects on the saⅿe borⅾer ⅼanⅾ with a ⅾifferent ⅾistrict base. This ⅾispսte occսrs becaսse there are no cⅼear anⅾ firⅿ rսⅼes governing ⅾoսbⅼe SKT on borⅾer ⅼanⅾ so there is no ⅼegaⅼ certainty for SKT hoⅼⅾers. Baseⅾ on the ⅾescription above, the researcher raises the probⅼeⅿ forⅿսⅼation
APA, Harvard, Vancouver, ISO, and other styles
34

Martynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.

Full text
Abstract:
The paper discusses the main stages of development of cryptographic protocols from SSL 2.0 (Secure Socket Layer) to TLS 1.3 (Transport Layer Security), which ensure the protection of transport layer data in the OSI model. A brief description of the modification of the RuTLS protocol based on TLS 1.3 and their main differences is given. The development of IPsec, which provides cryptographic protection of communications at the network level of the OSI model, is considered using examples of the development of the three most commonly used protocols. These include IKE (Internet Key Exchange), AH (A
APA, Harvard, Vancouver, ISO, and other styles
35

Sánchez-Valdés, A., R. M. Nava-Rogel, and A. Delgado-Cruz. "Motivaciones de empresas turísticas para certificarse en calidad. Evidencia empírica en el Estado de México." Revista Venezolana de Gerencia (RVG) 26, no. 93 (2021): 349–69. https://doi.org/10.52080/rvg93.24.

Full text
Abstract:
El objetivo es analizar las motivaciones que inciden en la facilidad de certificarse en calidad de las micro, pequeñas y medianas empresas (MIPYMES) turísticas de cinco municipios del Estado de México inscritos en el Programa Pueblos Mágicos: Valle de Bravo, Ixtapan de la Sal, Malinalco, Tepotzotlán y El Oro. Se aplicó una encuesta a 100 MIPYMES y se emplearon como técnicas para el tratamiento de datos la regresión lineal por pasos sucesivos y la modelación de ecuaciones estructurales por covarianzas (CB-SEM). Los resultados ponen
APA, Harvard, Vancouver, ISO, and other styles
36

Zhang, Liang, David Choffnes, Tudor Dumitraş, et al. "Analysis of SSL certificate reissues and revocations in the wake of heartbleed." Communications of the ACM 61, no. 3 (2018): 109–16. http://dx.doi.org/10.1145/3176244.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

M.Poovizhi, K.Karthika, S.Nandhini, and Dr.P.Gomathi. "Online Shopping With Spoofing Detection Using Web and Mobile Application." International Journal of Engineering Research & Science 4, no. 3 (2018): 29–34. https://doi.org/10.5281/zenodo.1213533.

Full text
Abstract:
<strong><em>Abstract</em></strong><strong>&mdash;</strong> <em>E-commerce is that the shopping for marketing of products and services, or the sending of funds or knowledge, over a web and straightforward access to immense stores of reference material, email, and new avenues for advertising and data distribution, to call some. Like most technological advances, there conjointly another side: criminal hackers. Governments, companies, and personal voters round the world area unit anxious to be an area of this revolution, however, they are afraid that some hacker can burgle their net server and rep
APA, Harvard, Vancouver, ISO, and other styles
38

Sathya, K., and A. Saraswathi. "Design of Privacy Preserving Model for Academic Documents Issuance and Verification Using Distributed Hyperledger Fabric Approach (PACIV) and SSI." Indian Journal Of Science And Technology 18, no. 20 (2025): 1554–64. https://doi.org/10.17485/ijst/v18i20.358.

Full text
Abstract:
Objectives: The challenges faced towards issuance of academic documents, verification of documents and moderation by authorities in comparison to traditional methods. Academic certificates issuance and verification can benefit greatly from blockchain-based privacy-preserving models, which offers a promising alternative to traditional paper-based methods. Primary objective of this research work PACIV is to establish a secure and decentralized network for managing academic certificates, the underlying technology used is the Hyperledger Fabric blockchain. Methods: Proposed PACIV platform connects
APA, Harvard, Vancouver, ISO, and other styles
39

Bostan, Atila. "Implicit learning with certificate warning messages on SSL web pages: what are they teaching?" Security and Communication Networks 9, no. 17 (2016): 4295–300. http://dx.doi.org/10.1002/sec.1607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Massard, Jos A., and Simone Schneider. "Von Diplomen und Vereinsabzeichen – Aus der Vereinsgeschichte der „Fauna“, Verein Luxemburger Naturfreunde." Bulletin de la Société des naturalistes luxembourgeois 125 (June 30, 2023): 17–23. http://dx.doi.org/10.59513/snl.2023.125.017.

Full text
Abstract:
The current paper deals with the membership certificate and the society badge of the “Fauna”, the ancestor of the present “Société des naturalistes luxembourgeois” (SNL) (The Luxembourg Naturalist Society). The membership certificate could be purchased by the members of the association from 1897 to 1905. The paper reports how it came to be produced, how many copies were made and to whom they were sold. Unfortunately, no copy of it has yet been found. The badge the “Fauna” issued to its members was sold from 1901 to 1905. Presently, only one specimen is known. It was recently handed over to the
APA, Harvard, Vancouver, ISO, and other styles
41

Syaifudin, Moh Rizki, Mohamad Ali Murtadho, Moh Shohibul Wafa, and Mukhamad Masrur. "Analisis Keamanan Website Kampus UNIPDU Melalui Metode <i>Vulnerability Assessment (VA)</i> dengan Menggunakan <i>Tools Acunetix</i>." Komputa : Jurnal Ilmiah Komputer dan Informatika 14, no. 1 (2025): 21–32. https://doi.org/10.34010/komputa.v14i1.14693.

Full text
Abstract:
Amidst the rapid development of technology, website vulnerabilities are a major threat, opening up opportunities for hackers to hunt and steal important data. Web applications are a technological innovation that not only facilitates access to information on the Unipdu Jombang campus, but also functions as the main link in the information system, even though they have to face major challenges in maintaining its security. By using the Vulnerability Assessment (VA) approach that utilizes Acunetix technology, this study attempts to assess the weaknesses of the Unipdu Jombang campus website and off
APA, Harvard, Vancouver, ISO, and other styles
42

Wang, Yingjie, Guangquan Xu, Xing Liu, et al. "Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis." Journal of Systems and Software 167 (September 2020): 110609. http://dx.doi.org/10.1016/j.jss.2020.110609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

du Plessis, Andre, and Bedroen Ismail. "Postgraduate Certificate in Education (PGCE) Students’ Experience of Mentoring." Revija za elementarno izobraževanje 15, no. 4 (2022): 447–73. http://dx.doi.org/10.18690/rei.15.4.447-473.2022.

Full text
Abstract:
The school practicum is an essential component of pre-service student teachers’ training in the PGCE qualification, affording opportunities to develop mentees’ own identities. Along with a range of competences. This study explores how student teachers at Nelson Mandela University perceived their School-Based Learning (SBL) mentoring experience about the roles that mentors should fulfil based on an adapted seven-factor framework (Hudson, 2004, 2009) by adopting a post-positivist paradigm. The findings showed that both groups of participants who would like to return to the same mentor again or t
APA, Harvard, Vancouver, ISO, and other styles
44

Chanti, S., and T. Chithralekha. "PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Polymorphic Treatment of Features." International journal of Computer Networks & Communications 15, no. 3 (2023): 93–112. http://dx.doi.org/10.5121/ijcnc.2023.15306.

Full text
Abstract:
Phishing scams are increasing drastically, which affects Internet users in compromising personal credentials. This paper proposes a novel feature utilization method for phishing URL detection called the Polymorphic property of features. In the initial stage, the URL-related features (46 features) were extracted. Later, a subset of features (19 out of 46) with the polymorphic property of features was identified, and they were extracted from different parts of the URL (the domain and path). After extracting the features, various machine learning classification algorithms were applied to build th
APA, Harvard, Vancouver, ISO, and other styles
45

Sun, Yunxiao, Bailing Wang, Chao Wang, and Yuliang Wei. "On Man-in-the-Middle Attack Risks of the VPN Gate Relay System." Security and Communication Networks 2021 (October 21, 2021): 1–7. http://dx.doi.org/10.1155/2021/9091675.

Full text
Abstract:
With the development of the Internet, more and more people use virtual private network (VPN) to circumvent censorship or hide themselves for privacy purposes. However, VPN itself faces some security and privacy risks. Widely used all over the world, the VPN Gate is a volunteer-organized public VPN relay system launched in 2013. By analyzing the security of the system, we have found that there is a man-in-the-middle attack risk because an attacker may hijack a VPN session and decrypt the traffic. According to our study, the reason of the security issues is the misuse of the SSL certificate. To
APA, Harvard, Vancouver, ISO, and other styles
46

Shantanu Kanade and Anuradha Kanade. "Secure degree attestation and traceability verification based on zero trust using QP-DSA and RD-ECC." Scientific Temper 15, spl-2 (2024): 188–95. https://doi.org/10.58414/scientifictemper.2024.15.spl-2.30.

Full text
Abstract:
The process of rendering authenticity to the Degree Certificate (DC) is known as Degree Attestation (DA). None of the prevailing works have focused on zero trust-based DA, verification, and traceability for secured DA. So, zero trust-based secured DA, verification, and traceability of degree credentials are presented in the paper. Primarily, to upload the DC of the student, the university registers and logs in to the Blockchain (BC). Subsequently, by utilizing radioactive decay-based elliptic curve cryptography (RD-ECC), the DC is secured. Next, by utilizing Glorot initialization-based Proof-o
APA, Harvard, Vancouver, ISO, and other styles
47

Tambunan, Alexander Theo Philus, Adi Prijuna Lubis, and Syartika Anggraini. "Perancangan Sistem Keamanan File Transfer Protocol Dengan Secure Socket Layer Pada Server Centos 7." J-Com (Journal of Computer) 1, no. 2 (2021): 95–102. http://dx.doi.org/10.33330/j-com.v2i1.1206.

Full text
Abstract:
Abstract: An advancement in communication technology currently has an influence on developments in data management in the joints of life, making the need for a media center something a must in digital archive storage. Data will not always be stored in personal computers, but it would be better if there was a centralized data container to be a solution in storage media, in order to prevent data loss or data backup. The term network (network) is used when there are at least two or more devices that are connected to one another. To carry out data exchange in this network, a protocol is used that
APA, Harvard, Vancouver, ISO, and other styles
48

ŞAHİN, Mehmet. "MOTIVATIONS OF SLL-WEB SERVICE ADMINISTRATORS IN USING SELF-SIGNED DIGITAL CERTIFICATES." Journal of Social Sciences 2, no. 4 (2015): 209. http://dx.doi.org/10.16990/sobider.90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Li, Chi, Zuxing Gu, Min Zhou, Jiecheng Wu, Jiarui Zhang, and Ming Gu. "API Misuse Detection in C Programs: Practice on SSL APIs." International Journal of Software Engineering and Knowledge Engineering 29, no. 11n12 (2019): 1761–79. http://dx.doi.org/10.1142/s0218194019400205.

Full text
Abstract:
Libraries offer reusable functionality through Application Programming Interfaces (APIs) with usage constraints such as call conditions or orders. Constraint violations, i.e. API misuses, commonly lead to bugs and security issues. Although researchers have developed various API misuse detectors in the past few decades, recent studies show that API misuse is prevalent in real-world projects, especially for secure socket layer (SSL) certificate validation, which is completely broken in many security-critical applications and libraries. In this paper, we introduce SSLDoc to effectively detect API
APA, Harvard, Vancouver, ISO, and other styles
50

Lapshichyov, Vitaly, and Oleg Makarevich. "Method for Detecting and Identification of Tor Network Data by Wireshark Analyzer." Voprosy kiberbezopasnosti, no. 4(44) (2021): 73–80. http://dx.doi.org/10.21681/2311-3456-2021-4-73-80.

Full text
Abstract:
Purpose of the study: development of a method that allows detecting and identifying packets of the Tor network, including obfuscated packets on the local machine of the network user, by a Wireshark sniffer using the filter syntax based on the features of the Tor network packets characteristic of the TLS v1.2 and v1.3 encryption versions; studying the possibility of using the SSL Bump attack (decrypting https traffic on a virtual server using self-signed x.509 certificates) to overcome the obfuscation of Tor network packets. Method: software analysis of transmitted network packets, decompositio
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!