Journal articles on the topic 'Certificats SSL'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Certificats SSL.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lapshichyov, Vitaly V. "TLS Certificates of the Tor Network and Their Distinctive Features." International Journal of Systems and Software Security and Protection 10, no. 2 (2019): 20–43. http://dx.doi.org/10.4018/ijsssp.2019070102.
Full textMohit, Thodupunuri. "The Right Way to Manage SSL/TLS Certificates in Modern Applications and Infrastructure." European Journal of Advances in Engineering and Technology 11, no. 3 (2024): 30–37. https://doi.org/10.5281/zenodo.15607021.
Full textSuwayeb, Abdulaziz Mahmud, and Mahmoud Mohamed Elsaghayer. "Using Elliptic-Curve to Implements SSL Certificate Derives from CSR to Make Secure Connection between Server and Client." International Science and Technology Journal 36, no. 1 (2025): 1–11. https://doi.org/10.62341/amuc1218.
Full textMinakhvatov, Bulat Rafkatovich, and Vladislav Aleksandrovich Strigunov. "SSL CERTIFICATE." Problemy sovershenstvovaniya organizatsii proizvodstva i upravleniya promyshlennymi predpriyatiyami: Mezhvuzovskii sbornik nauchnykh trudov, no. 1 (2021): 217–22. http://dx.doi.org/10.46554/op-mie-2021.1-pp.217.
Full textHalder, Ratna, Dipanjan Das Roy, and Dongwan Shin. "A Blockchain-Based Decentralized Public Key Infrastructure Using the Web of Trust." Journal of Cybersecurity and Privacy 4, no. 2 (2024): 196–222. http://dx.doi.org/10.3390/jcp4020010.
Full textCueva Hurtado, Mario E., and Diego Javier Alvarado Sarango. "Análisis de Certificados SSL/TLS gratuitos y su implementación como Mecanismo de seguridad en Servidores de Aplicación." Enfoque UTE 8, no. 1 (2017): 273–86. http://dx.doi.org/10.29019/enfoqueute.v8n1.128.
Full textFoppe, Lucas, Jeremy Martin, Travis Mayberry, Erik C. Rye, and Lamont Brown. "Exploiting TLS Client Authentication for Widespread User Tracking." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (2018): 51–63. http://dx.doi.org/10.1515/popets-2018-0031.
Full textXing, Qianqian, Xiaofeng Wang, Xinyue Xu, et al. "BRT: An Efficient and Scalable Blockchain-Based Revocation Transparency System for TLS Connections." Sensors 23, no. 21 (2023): 8816. http://dx.doi.org/10.3390/s23218816.
Full textLapshichyov, Vitaly V., and Oleg B. Makarevich. "Detection and identification method of the tor bundle use." Informatization and communication, no. 3 (May 5, 2020): 17–20. http://dx.doi.org/10.34219/2078-8320-2020-11-3-17-20.
Full textPark, Hun Myoung. "The Pitfalls of the Certificate-Based User Authentication Scheme on Korean Public Websites." Journal of Cases on Information Technology 26, no. 1 (2024): 1–19. http://dx.doi.org/10.4018/jcit.355015.
Full textSebastian, S., and R. S. Chouhan. "Privacy Preservation and Data Security on Internet Using Mutual Ssl." Oriental journal of computer science and technology 10, no. 1 (2017): 249–54. http://dx.doi.org/10.13005/ojcst/10.01.34.
Full textPark, Jun-Cheol. "Cookie-Based Identification of the Public Keys of TLS/SSL Certificates." Journal of Korean Institute of Communications and Information Sciences 41, no. 1 (2016): 101–3. http://dx.doi.org/10.7840/kics.2015.41.1.101.
Full textKumar, Rajesh, and K. Rekha. "Strengthening SSL Security with attribute certificate." EAI Endorsed Transactions on Cloud Systems 3, no. 11 (2018): 154465. http://dx.doi.org/10.4108/eai.11-4-2018.154465.
Full textFedkova, N. A., and D. A. Fedkov. "Development of PowerShell Scripts for Automating Windows OS Administration Processes. Automating the Process of Creating and Distributing SSL Certificates to Servers." Vestnik NSU. Series: Information Technologies 20, no. 1 (2022): 81–96. http://dx.doi.org/10.25205/1818-7900-2022-20-1-81-96.
Full textMeyer, Helen. "Securing intranet data with SSL client certificates." Computers & Security 16, no. 4 (1997): 334. http://dx.doi.org/10.1016/s0167-4048(97)80213-1.
Full textKomalasari, Dinny, Tri Basuki Kurniawan, Deshinta Arrova Dewi, Mohd Zaki Zakaria, Zubaile Abdullah, and Alde Alanda. "Phishing Domain Detection Using Machine Learning Algorithms." International Journal on Advanced Science, Engineering and Information Technology 15, no. 1 (2025): 318–27. https://doi.org/10.18517/ijaseit.15.1.12553.
Full textA. Karunamurthy, Dr. "SECURE AND SCALABLE WORDPRES DEPLOYMENT ON AWS WITH RDS." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–9. https://doi.org/10.55041/isjem04077.
Full textAu, Andrew C. H., Brenda H. S. Lam, Y. C. Kwan, and Angus K. K. Tung. "Pressure Calibration of Quarter-Inch Working Standard Microphones by Comparison." NCSLI Measure 14, no. 1 (2022): 40–48. http://dx.doi.org/10.51843/measure.14.1.7.
Full textAnelia, Syifa Sabrina, Jayanta Jayanta, and Bayu Hananto. "Uji Penetrasi Server Universitas PQR Menggunakan Metode National Institute Of Standards And Technology (NIST SP 800-115)." Jurnal Ilmu Teknik dan Komputer 7, no. 1 (2023): 34. http://dx.doi.org/10.22441/jitkom.2023.v7i1.005.
Full textXu, Da Wei. "The Implementation of Mobile Agent System Based X.509 Certificate." Advanced Materials Research 403-408 (November 2011): 1270–73. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1270.
Full textKappenberger, Reiner. "The true cost of self-signed SSL certificates." Computer Fraud & Security 2012, no. 9 (2012): 14–16. http://dx.doi.org/10.1016/s1361-3723(12)70092-1.
Full textPeñarrieta, David, Marlon Navia, Eliana Garcia, and Dannyll Zambrano. "Evaluación de la Seguridad de Certificados Digitales en las Plataformas Financieras de Ecuador." Revista Tecnológica - ESPOL 36, no. 2 (2024): 174–89. https://doi.org/10.37815/rte.v36n2.1222.
Full textSun, Yuteng, Joyanta Debnath, Wenzheng Hong, Omar Chowdhury, and Sze Yiu Chau. "On the Unnecessary Complexity of Names in X.509 and Their Impact on Implementations." Proceedings of the ACM on Software Engineering 2, FSE (2025): 1454–74. https://doi.org/10.1145/3715785.
Full textTian, Cong, Chu Chen, Zhenhua Duan, and Liang Zhao. "Differential Testing of Certificate Validation in SSL/TLS Implementations." ACM Transactions on Software Engineering and Methodology 28, no. 4 (2019): 1–37. http://dx.doi.org/10.1145/3355048.
Full textB, Risma, Azhar Azhar, and Makhdalena Makhdalena. "IMPLEMENTASI KERANGKA KUALIFIKASI NASIONAL INDONESIA DI LEMBAGA KURSUS UNIVERSAL SKILL PEKANBARU." Jurnal Manajemen Pendidikan Penelitian Kualitatif 2, no. 2 (2018): 242. http://dx.doi.org/10.31258/jmppk.2.2.p.242-247.
Full textThurimella, Ramakrishna, and William Mitchell. "Cloak and Dagger." International Journal of Information Security and Privacy 3, no. 3 (2009): 55–75. http://dx.doi.org/10.4018/jisp.2009100704.
Full textAntonishyn, Mykhailo. "Four ways to bypass Android SSL. Verification and Certificate Pinning." Transfer of Innovative Technologies 3, no. 1 (2020): 96–99. http://dx.doi.org/10.32347/tit2020.31.0302.
Full textRazumov, Pavel, Larissa Cherckesova, Elena Revyakina, Sergey Morozov, Dmitry Medvedev, and Andrei Lobodenko. "Ensuring the security of web applications operating on the basis of the SSL/TLS protocol." E3S Web of Conferences 402 (2023): 03028. http://dx.doi.org/10.1051/e3sconf/202340203028.
Full textSeniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle, and Fahmi Fahmi. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (2021): 507. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp507-515.
Full textSeniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle, and Fahmi Fahm. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (2021): 507–15. https://doi.org/10.11591/ijeecs.v22.i1.pp507-515.
Full textDakov, Stanislav, and Anna Malinova. "A SURVEY OF E-COMMERCE SECURITY THREATS AND SOLUTIONS." Proceedings of CBU in Natural Sciences and ICT 2 (October 24, 2021): 1–9. http://dx.doi.org/10.12955/pns.v2.135.
Full textKATO, Hiroya, Shuichiro HARUTA, and Iwao SASASE. "Android Malware Detection Scheme Based on Level of SSL Server Certificate." IEICE Transactions on Information and Systems E103.D, no. 2 (2020): 379–89. http://dx.doi.org/10.1587/transinf.2019edp7119.
Full textHermawan, Tommy. "Legal Certainty To Double Land Statement Letter (Skl) Holders In Land Boarders (Study Case In Teteilanan Village, South Barito Regency, Center Kalimantan)." Pancasila and Law Review 1, no. 2 (2021): 137. http://dx.doi.org/10.25041/plr.v1i2.2157.
Full textMartynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.
Full textSánchez-Valdés, A., R. M. Nava-Rogel, and A. Delgado-Cruz. "Motivaciones de empresas turísticas para certificarse en calidad. Evidencia empírica en el Estado de México." Revista Venezolana de Gerencia (RVG) 26, no. 93 (2021): 349–69. https://doi.org/10.52080/rvg93.24.
Full textZhang, Liang, David Choffnes, Tudor Dumitraş, et al. "Analysis of SSL certificate reissues and revocations in the wake of heartbleed." Communications of the ACM 61, no. 3 (2018): 109–16. http://dx.doi.org/10.1145/3176244.
Full textM.Poovizhi, K.Karthika, S.Nandhini, and Dr.P.Gomathi. "Online Shopping With Spoofing Detection Using Web and Mobile Application." International Journal of Engineering Research & Science 4, no. 3 (2018): 29–34. https://doi.org/10.5281/zenodo.1213533.
Full textSathya, K., and A. Saraswathi. "Design of Privacy Preserving Model for Academic Documents Issuance and Verification Using Distributed Hyperledger Fabric Approach (PACIV) and SSI." Indian Journal Of Science And Technology 18, no. 20 (2025): 1554–64. https://doi.org/10.17485/ijst/v18i20.358.
Full textBostan, Atila. "Implicit learning with certificate warning messages on SSL web pages: what are they teaching?" Security and Communication Networks 9, no. 17 (2016): 4295–300. http://dx.doi.org/10.1002/sec.1607.
Full textMassard, Jos A., and Simone Schneider. "Von Diplomen und Vereinsabzeichen – Aus der Vereinsgeschichte der „Fauna“, Verein Luxemburger Naturfreunde." Bulletin de la Société des naturalistes luxembourgeois 125 (June 30, 2023): 17–23. http://dx.doi.org/10.59513/snl.2023.125.017.
Full textSyaifudin, Moh Rizki, Mohamad Ali Murtadho, Moh Shohibul Wafa, and Mukhamad Masrur. "Analisis Keamanan Website Kampus UNIPDU Melalui Metode <i>Vulnerability Assessment (VA)</i> dengan Menggunakan <i>Tools Acunetix</i>." Komputa : Jurnal Ilmiah Komputer dan Informatika 14, no. 1 (2025): 21–32. https://doi.org/10.34010/komputa.v14i1.14693.
Full textWang, Yingjie, Guangquan Xu, Xing Liu, et al. "Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis." Journal of Systems and Software 167 (September 2020): 110609. http://dx.doi.org/10.1016/j.jss.2020.110609.
Full textdu Plessis, Andre, and Bedroen Ismail. "Postgraduate Certificate in Education (PGCE) Students’ Experience of Mentoring." Revija za elementarno izobraževanje 15, no. 4 (2022): 447–73. http://dx.doi.org/10.18690/rei.15.4.447-473.2022.
Full textChanti, S., and T. Chithralekha. "PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Polymorphic Treatment of Features." International journal of Computer Networks & Communications 15, no. 3 (2023): 93–112. http://dx.doi.org/10.5121/ijcnc.2023.15306.
Full textSun, Yunxiao, Bailing Wang, Chao Wang, and Yuliang Wei. "On Man-in-the-Middle Attack Risks of the VPN Gate Relay System." Security and Communication Networks 2021 (October 21, 2021): 1–7. http://dx.doi.org/10.1155/2021/9091675.
Full textShantanu Kanade and Anuradha Kanade. "Secure degree attestation and traceability verification based on zero trust using QP-DSA and RD-ECC." Scientific Temper 15, spl-2 (2024): 188–95. https://doi.org/10.58414/scientifictemper.2024.15.spl-2.30.
Full textTambunan, Alexander Theo Philus, Adi Prijuna Lubis, and Syartika Anggraini. "Perancangan Sistem Keamanan File Transfer Protocol Dengan Secure Socket Layer Pada Server Centos 7." J-Com (Journal of Computer) 1, no. 2 (2021): 95–102. http://dx.doi.org/10.33330/j-com.v2i1.1206.
Full textŞAHİN, Mehmet. "MOTIVATIONS OF SLL-WEB SERVICE ADMINISTRATORS IN USING SELF-SIGNED DIGITAL CERTIFICATES." Journal of Social Sciences 2, no. 4 (2015): 209. http://dx.doi.org/10.16990/sobider.90.
Full textLi, Chi, Zuxing Gu, Min Zhou, Jiecheng Wu, Jiarui Zhang, and Ming Gu. "API Misuse Detection in C Programs: Practice on SSL APIs." International Journal of Software Engineering and Knowledge Engineering 29, no. 11n12 (2019): 1761–79. http://dx.doi.org/10.1142/s0218194019400205.
Full textLapshichyov, Vitaly, and Oleg Makarevich. "Method for Detecting and Identification of Tor Network Data by Wireshark Analyzer." Voprosy kiberbezopasnosti, no. 4(44) (2021): 73–80. http://dx.doi.org/10.21681/2311-3456-2021-4-73-80.
Full text