Essays about: "Transport Layer Security"

Showing result 1 - 5 of 34 essays containing the words Transport Layer Security.

  1. 1. Low-latency transport protocols inactor systems : Performance evaluation of QUIC in Kompact

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jódís Gunnlaugsdóttir; [2023]
    Keywords : Kompact; Component-Actor hybrid framework; Transmission Control Protocol; User Datagram Protocol; Aeron; Quic;

    Abstract : Developers widely use actor frameworks to build highly distributed systems. However, modern actor frameworks are limited in their network implementations, with Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) being the main protocols used for network communication. READ MORE

  2. 2. Design and evaluation of an inter-core QUIC connection migration approach for intra-server load balancing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zhe Wang; [2021]
    Keywords : Intra-server load balancing; QUIC protocol; Connection migration; BPF; Connection management; Lastbalansering mellan servern; QUIC protokoll; Anslutningsmigrering; BPF; Anslutningshantering;

    Abstract : With the emergence of novel cloud applications and their critical latency demand [1], Quick UDP Internet Connection (QUIC) [2] was proposed as a new transport protocol that is promising to reduce the connection establishment overhead while providing security properties similar to Transport Layer Security (TLS) [3]. However, without an efficient task scheduling mechanism, the high cost for encryption and decryption in QUIC can easily lead to load imbalance among multiple Central Processing Unit (CPU) cores and thus cause a high tail latency. READ MORE

  3. 3. Protocol-aware fuzzing of DTLS

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Rahbar Ghori; [2021]
    Keywords : ;

    Abstract : Communication protocols like TCP and UDP enable transfer of databetween sender and receiver during online communication. To provide security from eavesdropping, message forgery and data tampering during online communication, communication protocols likeTLS and DTLS are run on top of TCP/UDP. READ MORE

  4. 4. Which News Articles are You Reading? : Using Fingerprinting to Attack Internal Pages of News Websites

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Martin Lindblom; [2021]
    Keywords : Fingerprint Attack; Privacy; Transport Layer Security; TLS; Real-World Scenario; News Websites; News Articles; Proxy-Less Labelling Heuristic; Transmission Control Protocol; TCP; Internal Pages; Automatic Data Collection;

    Abstract : When performing fingerprinting attacks against websites in a controlled environment astudy may achieve very promising results. However, these can be misleading as the closedworld setting may not accurately represent the real-world. READ MORE

  5. 5. Characterization of cipher suite selection, downgrading, and other weaknesses observed in the wild

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Edvin Kjell; Sebastian Frisenfelt; [2021]
    Keywords : TLS; HTTPS; HSTS; cipher suites; vulnerabilities;

    Abstract : The importance of security on the web is growing every day. How domains handle and prioritize their level of security is varying. Tradeoffs between security and convenience have to be made to uphold a website's public image. This thesis uses a subset of domains from the Alexa Top 1M list. READ MORE