نتایج جستجو برای: ssl

تعداد نتایج: 1571  

Journal: :Revista da Sociedade Brasileira de Medicina Tropical 2016
Emanuella Francisco Fajardo Marlene Cabrine-Santos Keila Adriana Magalhães Ferreira Eliane Lages-Silva Luis Eduardo Ramírez André Luiz Pedrosa

INTRODUCTION This work shows that 3% (v/v) human urine (HU) in semisolid Liver Infusion Tryptose (SSL) medium favors the growth of Trypanosoma cruzi and T. rangeli. METHODS Parasites were plated as individual or mixed strains on SSL medium and on SSL medium with 3% human urine (SSL-HU). Isolate DNA was analyzed using polymerase chain reaction (PCR) and pulsed-field gel electrophoresis (PFGE)....

2011
Salih Taşkın Mete Güngör Elif Aylin Taşkın Fırat Ortaç

Address for Correspondence / Yazışma Adresi: Dr. Salih Taşkın, Ankara Üniversitesi Tıp Fakültesi, Kadın Hastalıkları ve Doğum Anabilim Dalı, 06100 Cebeci, Ankara, Turkey Phone: +90 312 595 78 69 e.mail: [email protected] doi:10.5152/jtgga.2011.05 Objective: To evaluate the role of surgical second look (SSL) in epithelial ovarian cancer. Material and Methods: One hundred and seventy-one pati...

Journal: :Security and Communication Networks 2012
Wassim El-Hajj

Attacks have been targeting secure socket layer (SSL) from the time it was created especially because of its utmost importance in securing Web transactions. These attacks are either attacks exploiting vulnerabilities in the SSL protocol itself, or attacks exploiting vulnerabilities in the services that SSL uses, such as certificates and web browsers. While the attacks on SSL itself have been su...

S. Valaee V. Pourahmadi

Rapid expansions of new location-based services signify the need for finding accurate localization techniques for indoor environments. Among different techniques, RSS-based  schemes and in particular oneof its variants which is based on Graph-based Semi-Supervised Learning (G-SSL) are widely-used approaches The superiority of this scheme is that it has low setup/training cost and at the same ti...

2004
Eun-Ae Cho Young-Gab Kim Chang-Joo Moon Doo-Kwon Baik

SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerable burden to the CPU utilization so that performance and speed of the security service is lowered during encryption transaction. Second, SSL protocol can be vulnerable for cryptanalysis due to the fixed algorithm being used. Thi...

2009
Ahmad Samer Wazan Romain Laborde David W. Chadwick François Barrère Abdelmalek Benzekri

SSL is the primary technology used to secure web communications. Before setting up an SSL connection, web browsers have to validate the SSL certificate of the web server in order to ensure that users access the expected web site. We have tested the handling of the main fields in SSL certificates and found that web browsers do not process them in a homogenous way. An SSL certificate can be accep...

Journal: :JCM 2016
Haitao Dong Lei Song Jin-Lin Wang Jun Yang

—Although Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS) are the for transport layer security, their cryptographic operations tend to be highly CPU intensive. Web systems that support SSL/TLS often deploy several locally or globally distributed SSL reverse proxies in front of Web servers to offload SSL/TLS operations from Web servers and improve the execution perfo...

1998
John C. Mitchell Vitaly Shmatikov Ulrich Stern

The Secure Sockets Layer (SSL) protocol is analyzed using a nite-state enumeration tool called Mur'. The analysis is presented using a sequence of incremental approximations to the SSL 3.0 handshake protocol. Each simpliied protocol is \model-checked" using Mur', with the next protocol in the sequence obtained by correcting errors that Mur' nds automatically. This process identiies the main sho...

2004
Yong Song Victor C. M. Leung Konstantin Beznosov

Secure Socket Layer (SSL) has functional limitations that prevent end-to-end security in the presence of untrusted intermediary application proxies used by clients to communicate with servers. This paper introduces Multiple-Channel SSL (MC-SSL), an extension of SSL, and describes and analyzes the design of MC-SSL proxy channel protocol that enables the support for end-to-end security of client-...

2015
Yaoqi Jia Yue Chen Xinshu Dong Prateek Saxena Jian Mao Zhenkai Liang

When browsing the web using HTTPS, if a user Alice ignores, or clicks through, the browser’s SSL warnings of an invalid SSL certificate, she exposes her browser sessions to a Man-in-the-middle (MITM) attack, allowing attackers to intercept communication in the SSL channel. Recent work has measured the click-through rates for SSL warnings, indicating that more than 50% users click through SSL wa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید