نتایج جستجو برای: tls traffic analysis

تعداد نتایج: 2901176  

A. fanian, E. Mahdavi, H. Hassannejad

Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...

2013
Yossi Gilad Amir Herzberg Haya Shulman

Everyone is concerned about the Internet security, yet most traffic is not cryptographically protected. The usual justification is that most attackers are only off-path and cannot intercept traffic; hence, challenge-response mechanisms suffice to ensure authenticity. Usually, the challenges re-use existing ‘unpredictable’ header fields to protect widely-deployed protocols such as TCP and DNS. W...

2014
Britt Cyr Webb Horn Daniela Miao Michael Specter

This report describes an analysis of the Fitbit Flex ecosystem. Our objectives are to describe (1) the data Fitbit collects from its users, (2) the data Fitbit provides to its users, and (3) methods of recovering data not made available to device owners. Our analysis covers four distinct attack vectors. First, we analyze the security and privacy properties of the Fitbit device itself. Next, we ...

Journal: :medical journal of islamic republic of iran 0
ali moradi department of epidemiology, faculty of public health, shahid beheshti university of medical sciences, tehran, iran. hamid soori safety promotion and injury prevention research center, school of public health, shahid beheshti university, tehran, iran. amir kavousi school of health, safety and environment, shahid beheshti university of medical sciences, tehran, iran. farshid eshghabadi faculty of geography, department of human geography/urban planning, university of tehran, tehran, iran. ensiyeh jamshidi community based participatory research center, iranian institute for reduction of high-risk behaviors, tehran university of medical sciences, tehran, iran. salahdien zeini colonel of road traffic police, crashes office, tehran's traffic police, tehran, iran.

background: more than 20% of deaths from traffic crashes are related to pedestrians. this figure in tehran, the capital of iran, reaches to 40%. this study aimed to determine the high-risk areas and spatially analyze the traffic crashes, causing death to pedestrians in tehran.   methods: mapping was used to display the distribution of the crashes. determining the distribution pattern of crashes...

2014
Aibek E. Mirrakhimov Alaa M. Ali Maliha Khan Aram Barbaryan

Tumor lysis syndrome (TLS) is a potentially deadly complication of tumors or their treatment. This syndrome consists of a constellation of laboratory findings such as hyperuricemia, hyperkalemia, hyperphosphatemia, and hypocalcemia, known as laboratory TLS. When clinical complications such as seizures, acute renal failure, and cardiac dysrhythmias occur in patients with laboratory TLS, the synd...

2017
Li Yan Junxiang Tan Hua Liu Hong Xie Changjun Chen

Registration of point clouds is a fundamental issue in Light Detection and Ranging (LiDAR) remote sensing because point clouds scanned from multiple scan stations or by different platforms need to be transformed to a uniform coordinate reference frame. This paper proposes an efficient registration method based on genetic algorithm (GA) for automatic alignment of two terrestrial LiDAR scanning (...

2011
Joseph Bonneau

We outline an end-to-end password authentication protocol for the web designed to be stateless and as secure as possible given legacy limitations of the web browser and performance constraints of commercial web servers. Our scheme is secure against very strong but passive attackers able to observe both network traffic and the server’s database state. At the same time, our scheme is simple for w...

Journal: :Journal of Cryptology 2021

Abstract We analyze the handshake protocol of Transport Layer Security (TLS) protocol, version 1.3. address both full TLS 1.3 (the one round-trip time mode, with signatures for authentication and (elliptic curve) Diffie–Hellman ephemeral ((EC)DHE) key exchange), abbreviated resumption/“PSK” mode which uses a pre-shared (with optional (EC)DHE exchange zero establishment). Our analysis in reducti...

2015
Karthikeyan Bhargavan Antoine Delignat-Lavaud Alfredo Pironti

Compound authentication protocols, such as EAP in IKEv2 or SASL over TLS, bind application-level authentication to a transport-level authenticated channel in order to obtain strong composite authentication under weak trust assumptions. Despite their wide deployment, these protocols remain poorly understood, leading to several credential forwarding man-in-themiddle attacks. We present formal mod...

2012
Sergio Aldea Diego R. Llanos Ferraris Arturo González-Escribano

– In-depth knowledge of the problem. – Understanding of the underlying architecture. – Knowledge on the parallel programming model. • OpenMP allows to parallelize code “avoiding” these requirements. • Compilers’ automatic parallelization only proceed when there is no risk. • Thread-Level Speculation (TLS) can extract parallelism when a compile-time dependence analysis can not guarantee that the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید