Using GSM to enhance e-commerce security
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
The Architecture of ArcIMS, a Distributed Internet Map Server
SSTD '01 Proceedings of the 7th International Symposium on Advances in Spatial and Temporal Databases
A monitoring/Auditing mechanism for SSL/TLS secured service sessions in health care applications
Technology and Health Care
Performance evaluation of public key-based authentication in future mobile communication systems
EURASIP Journal on Wireless Communications and Networking - Special issue on innovative signal transmission and detection techniques for next generation cellular CDMA systems
Component reuse in electronic services development
Journal of Computational Methods in Sciences and Engineering - Selected papers from the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications, 2004
An Empirical Study on the Performance of Java/.Net Cryptographic APIs
Information Systems Security
Decision Support Systems
Formal Modelling of PKI Based Authentication
Electronic Notes in Theoretical Computer Science (ENTCS)
Implementation of a open source security software platform in a telemedicine network
ISPACT'10 Proceedings of the 9th WSEAS international conference on Advances in e-activities, information security and privacy
Understanding abstractions of secure channels
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
Specifying and modelling secure channels in strand spaces
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
On the robustness of applications based on the SSL and TLS security protocols
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 0.00 |
From the Publisher:SSL and TLS Essentials provides complete documentation of the SSL and TLS protocols, including advanced and proprietary extensions never before published. The book thoroughly covers the protocols in operation, including the contents of their messages, message formats, and the cryptographic calculations used to construct them. The text also includes an introduction to cryptography and an explanation of X.509 public key certificates. Stephen Thomas, author of IPng and the TCP/IP Protocols, presents this complex material in a clear and reader-friendly manner. The book includes more than 80 figures and illustrations to supplement its text, and it describes SSL in the context or real-world, practical applications. Readers will immediately understand not only the academic principles behind the security protocols, but how those principles apply to their own network security challenges.