نتایج جستجو برای: tls traffic analysis
تعداد نتایج: 2901176 فیلتر نتایج به سال:
We describe TrustBase, an architecture that provides certificate-based authentication as an operating system service. TrustBase enforces best practices for certificate validation for all applications and transparently enables existing applications to be strengthened against failures of the CA system. The TrustBase system allows simple deployment of authentication systems that harden the CA syst...
In this paper we investigate how consumers respond to the UK food label Traffic Light System (TLS). Employing a Choice Experiment (CE) we find that consumers appear to behave in a manner consistent with our expectations regarding the impact of the TLS nutrition label. In particular, we identify a strong preference on the part of respondents to avoid a basket of goods containing a mix of foods w...
Transport Layer Security (TLS) based malware is one of the most hazardous types, as it relies on encryption to conceal connections. Due complexity TLS traffic decryption, several anomaly-based detection studies have been conducted detect TLS-based using different features and machine learning (ML) algorithms. However, these utilized flow with no feature transformation or relied inefficient tran...
In a previous paper [Zhu et al., J. Opt. Soc. Am. A 14, 799 (1997)] an iterative algorithm for obtaining the total least-squares (TLS) solution of a linear system based on the Rayleigh quotient formulation was presented. Here we derive what to our knowledge are the first statistical properties of this solution. It is shown that the Rayleigh-quotient-form TLS (RQF-TLS) estimator is equivalent to...
In this study, individual tree height (TH), crown base height (CBH), crown area (CA) and crown volume (CV), which were considered as essential parameters for individual stem volume and biomass estimation, were estimated by both an airborne laser scanner (ALS) and a terrestrial laser scanner (TLS). These ALSand TLS-derived tree parameters were compared because TLS has been introduced as an instr...
TLS is the most important cryptographic protocol in the Internet. At CRYPTO 2012, Jager et al. presented the first proof of the unmodified TLS with ephemeral Diffie-Hellman key exchange (TLS-DHE) for mutual authentication. Since TLS cannot be proven secure under the classical definition of authenticated key exchange (AKE), they introduce a new security model called authenticated and confidentia...
Terrestrial laser scanners (TLS) have the potential to revolutionise measurement of the three-dimensional structure of vegetation canopies for applications in ecology, hydrology and climate change. This potential has been the subject of recent research that has attempted to measure forest biophysical variables from TLS data, and make comparisons with two-dimensional data from hemispherical phot...
UNLABELLED Translocated in liposarcoma (TLS) is a poorly characterized multifunctional protein involved in the genotoxic response. TLS regulates gene expression at several steps, including splicing and mRNA transport, possibly connecting transcriptional and posttranscriptional events. AIMS In this study we aimed to idenfity molecular targets and regulatory partners of TLS. RESULTS AND INNOV...
In response to high-profile attacks that exploit hash function collisions, software vendors have started to phase out the use of MD5 and SHA-1 in third-party digital signature applications such as X.509 certificates. However, weak hash constructions continue to be used in various cryptographic constructions within mainstream protocols such as TLS, IKE, and SSH, because practitioners argue that ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید