From the Publisher:
SSL and TLS Essentials provides complete documentation of the SSL and TLS protocols, including advanced and proprietary extensions never before published. The book thoroughly covers the protocols in operation, including the contents of their messages, message formats, and the cryptographic calculations used to construct them. The text also includes an introduction to cryptography and an explanation of X.509 public key certificates. Stephen Thomas, author of IPng and the TCP/IP Protocols, presents this complex material in a clear and reader-friendly manner. The book includes more than 80 figures and illustrations to supplement its text, and it describes SSL in the context or real-world, practical applications. Readers will immediately understand not only the academic principles behind the security protocols, but how those principles apply to their own network security challenges.
Cited By
- Caballero P, Ortiz G, Garcia-de-Prado A and Boubeta-Puig J (2021). Paving the way to collaborative context-aware mobile applications: a case study on preventing worsening of allergy symptoms, Multimedia Tools and Applications, 80:14, (21101-21133), Online publication date: 1-Jun-2021.
- Zhang C, Yang D, Chen C and Ren P Checking Compliance of X.509 Digital Certificates over IPv6 with Specifications Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies, (445-450)
- (2019). An identity-based cryptographic scheme for cloud storage applications, International Journal of Grid and Utility Computing, 10:2, (93-104), Online publication date: 1-Jan-2019.
- Perera C, Qin Y, Estrella J, Reiff-Marganiec S and Vasilakos A (2017). Fog Computing for Sustainable Smart Cities, ACM Computing Surveys, 50:3, (1-43), Online publication date: 31-May-2018.
- (2016). Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions' architectures, Microprocessors & Microsystems, 45:PB, (227-240), Online publication date: 1-Sep-2016.
- Michail H, Ioannou L and Voyiatzis A Pipelined SHA-3 Implementations on FPGA Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, (13-18)
- Huerta M, Viva T, Clotet R, Gonzalez R, Alvizu R, Peréz A, Rivas D, Escalante F and Gonzalez R Implementation of a open source security software platform in a telemedicine network Proceedings of the 9th WSEAS international conference on Advances in e-activities, information security and privacy, (72-76)
- Kamil A and Lowe G Understanding abstractions of secure channels Proceedings of the 7th International conference on Formal aspects of security and trust, (50-64)
- Kamil A and Lowe G Specifying and modelling secure channels in strand spaces Proceedings of the 6th international conference on Formal Aspects in Security and Trust, (233-247)
- Haidar A and Abdallah A (2009). Formal Modelling of PKI Based Authentication, Electronic Notes in Theoretical Computer Science (ENTCS), 235, (55-70), Online publication date: 1-Apr-2009.
- Berbecaru D and Lioy A On the robustness of applications based on the SSL and TLS security protocols Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice, (248-264)
- Khu-smith V and Mitchell C Using GSM to enhance e-commerce security Proceedings of the 2nd international workshop on Mobile commerce, (75-81)
Recommendations
SSL/TLS session-aware user authentication revisited
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications. In Oppliger R, Hauser R, Basin D [SSL/TLS session-aware user authentication - or how to effectively thwart the man-in-the-middle. Computer Communications ...