skip to main content
Skip header Section
SSL and TLS Essentials: Securing the Web with CD-ROMJanuary 2000
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
ISBN:978-0-471-38354-3
Published:01 January 2000
Pages:
224
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Publisher:

SSL and TLS Essentials provides complete documentation of the SSL and TLS protocols, including advanced and proprietary extensions never before published. The book thoroughly covers the protocols in operation, including the contents of their messages, message formats, and the cryptographic calculations used to construct them. The text also includes an introduction to cryptography and an explanation of X.509 public key certificates. Stephen Thomas, author of IPng and the TCP/IP Protocols, presents this complex material in a clear and reader-friendly manner. The book includes more than 80 figures and illustrations to supplement its text, and it describes SSL in the context or real-world, practical applications. Readers will immediately understand not only the academic principles behind the security protocols, but how those principles apply to their own network security challenges.

Cited By

  1. Caballero P, Ortiz G, Garcia-de-Prado A and Boubeta-Puig J (2021). Paving the way to collaborative context-aware mobile applications: a case study on preventing worsening of allergy symptoms, Multimedia Tools and Applications, 80:14, (21101-21133), Online publication date: 1-Jun-2021.
  2. ACM
    Zhang C, Yang D, Chen C and Ren P Checking Compliance of X.509 Digital Certificates over IPv6 with Specifications Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies, (445-450)
  3. (2019). An identity-based cryptographic scheme for cloud storage applications, International Journal of Grid and Utility Computing, 10:2, (93-104), Online publication date: 1-Jan-2019.
  4. ACM
    Perera C, Qin Y, Estrella J, Reiff-Marganiec S and Vasilakos A (2017). Fog Computing for Sustainable Smart Cities, ACM Computing Surveys, 50:3, (1-43), Online publication date: 31-May-2018.
  5. (2016). Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions' architectures, Microprocessors & Microsystems, 45:PB, (227-240), Online publication date: 1-Sep-2016.
  6. ACM
    Michail H, Ioannou L and Voyiatzis A Pipelined SHA-3 Implementations on FPGA Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, (13-18)
  7. Huerta M, Viva T, Clotet R, Gonzalez R, Alvizu R, Peréz A, Rivas D, Escalante F and Gonzalez R Implementation of a open source security software platform in a telemedicine network Proceedings of the 9th WSEAS international conference on Advances in e-activities, information security and privacy, (72-76)
  8. Kamil A and Lowe G Understanding abstractions of secure channels Proceedings of the 7th International conference on Formal aspects of security and trust, (50-64)
  9. Kamil A and Lowe G Specifying and modelling secure channels in strand spaces Proceedings of the 6th international conference on Formal Aspects in Security and Trust, (233-247)
  10. Haidar A and Abdallah A (2009). Formal Modelling of PKI Based Authentication, Electronic Notes in Theoretical Computer Science (ENTCS), 235, (55-70), Online publication date: 1-Apr-2009.
  11. Berbecaru D and Lioy A On the robustness of applications based on the SSL and TLS security protocols Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice, (248-264)
  12. ACM
    Khu-smith V and Mitchell C Using GSM to enhance e-commerce security Proceedings of the 2nd international workshop on Mobile commerce, (75-81)
Contributors

Recommendations