Multiple-Channel SSL (MC-SSL) is a new model and protocol to secure client-server communication. In contrast to SSL, which provides a single end-to-end secure channel, MCSSL can provide applications with multiple channels, and each channel can have a various number of application proxies, its own cipher suite and data flow direction. MC-SSL enjoys a few advantages over SSL including end-to-end security and selective security. This thesis first introduces the background and analyzes some security-related problems in client-server communications, especially when resource-constrained handheld devices are involved. The multiple-channel model of MC-SSL is then presented as a solution, and compared with other related work. This thesis further foc...
The techniques of secured socket layer (SSL) with client-side certificates for commercial web sites ...
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has cre...
This chapter presents security models for confidentiality and unforgeability of signcryption schemes...
Multiple-Channel SSL (MC-SSL) is a new model and protocol to secure client-server communication. In ...
This paper presents multiple-channel SSL (MC-SSL), an architecture and protocol for protecting clien...
This paper presents multiple-channel SSL (MC-SSL), an architecture and protocol for protecting clie...
Multiple-Channel SSL (MC-SSL) is our model and protocol for the security of client-server communicat...
Secure Socket Layer (SSL) has functional limitations that prevent end-to-end security in the presenc...
Personal computing devices are becoming more and more popular. These devices are able to collaborate...
Several security models of multiple-access channel (MAC) are investigated. First, we study the degra...
Secure protocols for password-based user authentication are well-studied in the cryptographic litera...
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has cre...
Today, secure communication channels are mostly set up via certificate-based protocols, such as Secu...
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has cre...
In order to electronically exchange information between network users in the web of data, different ...
The techniques of secured socket layer (SSL) with client-side certificates for commercial web sites ...
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has cre...
This chapter presents security models for confidentiality and unforgeability of signcryption schemes...
Multiple-Channel SSL (MC-SSL) is a new model and protocol to secure client-server communication. In ...
This paper presents multiple-channel SSL (MC-SSL), an architecture and protocol for protecting clien...
This paper presents multiple-channel SSL (MC-SSL), an architecture and protocol for protecting clie...
Multiple-Channel SSL (MC-SSL) is our model and protocol for the security of client-server communicat...
Secure Socket Layer (SSL) has functional limitations that prevent end-to-end security in the presenc...
Personal computing devices are becoming more and more popular. These devices are able to collaborate...
Several security models of multiple-access channel (MAC) are investigated. First, we study the degra...
Secure protocols for password-based user authentication are well-studied in the cryptographic litera...
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has cre...
Today, secure communication channels are mostly set up via certificate-based protocols, such as Secu...
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has cre...
In order to electronically exchange information between network users in the web of data, different ...
The techniques of secured socket layer (SSL) with client-side certificates for commercial web sites ...
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has cre...
This chapter presents security models for confidentiality and unforgeability of signcryption schemes...