The SSL/TLS protocols over HTTPs main tasks are to encrypt communication and provide verification to the user that the website is the one it is claiming to be. With an increase in egovernment and agencies using e-services where sensitive information can travel over the Internet the need for SSL/TLS has increased and will continue to increase. This study therefore aims to provide answers to how the Swedish agencies have configured their websites in terms of SSL/TLS and why they are at their current level of security in regards to SSL/TLS. A technical survey using the tool Qualys SSL Server Test was used in order to collect the configurations. Follow up interviews with a semi-structured qualitative approach was then used to answer the second ...
The focus of this thesis is to analyze cryptographic protocol and algorithm usage based on three dif...
The focus of this thesis is to analyze cryptographic protocol and algorithm usage based on three dif...
Practical cryptography represents one of the most important aspects of information security. One of ...
The SSL/TLS protocols over HTTPs main tasks are to encrypt communication and provide verification to...
Different browsers manage security in different ways when communicating with web servers. Many of th...
Different browsers manage security in different ways when communicating with web servers. Many of th...
Different browsers manage security in different ways when communicating with web servers. Many of th...
Getting incorrect website content has increased in recent years, which is a reflection of the web se...
Getting incorrect website content has increased in recent years, which is a reflection of the web se...
Background. Security on the web is a fundamental requirement as it becomes a bigger part of society ...
The importance of security on the web is growing every day. How domains handle and prioritize their ...
With e-governance steadily growing, citizen-to-state communication via Web sites is as well, placing...
With e-governance steadily growing, citizen-to-state communication via Web sites is as well, placing...
SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols ...
The focus of this thesis is to analyze cryptographic protocol and algorithm usage based on three dif...
The focus of this thesis is to analyze cryptographic protocol and algorithm usage based on three dif...
The focus of this thesis is to analyze cryptographic protocol and algorithm usage based on three dif...
Practical cryptography represents one of the most important aspects of information security. One of ...
The SSL/TLS protocols over HTTPs main tasks are to encrypt communication and provide verification to...
Different browsers manage security in different ways when communicating with web servers. Many of th...
Different browsers manage security in different ways when communicating with web servers. Many of th...
Different browsers manage security in different ways when communicating with web servers. Many of th...
Getting incorrect website content has increased in recent years, which is a reflection of the web se...
Getting incorrect website content has increased in recent years, which is a reflection of the web se...
Background. Security on the web is a fundamental requirement as it becomes a bigger part of society ...
The importance of security on the web is growing every day. How domains handle and prioritize their ...
With e-governance steadily growing, citizen-to-state communication via Web sites is as well, placing...
With e-governance steadily growing, citizen-to-state communication via Web sites is as well, placing...
SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols ...
The focus of this thesis is to analyze cryptographic protocol and algorithm usage based on three dif...
The focus of this thesis is to analyze cryptographic protocol and algorithm usage based on three dif...
The focus of this thesis is to analyze cryptographic protocol and algorithm usage based on three dif...
Practical cryptography represents one of the most important aspects of information security. One of ...