Essays about: "Transport Layer Security"
Showing result 1 - 5 of 34 essays containing the words Transport Layer Security.
-
1. Low-latency transport protocols inactor systems : Performance evaluation of QUIC in Kompact
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Developers widely use actor frameworks to build highly distributed systems. However, modern actor frameworks are limited in their network implementations, with Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) being the main protocols used for network communication. READ MORE
-
2. Design and evaluation of an inter-core QUIC connection migration approach for intra-server load balancing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the emergence of novel cloud applications and their critical latency demand [1], Quick UDP Internet Connection (QUIC) [2] was proposed as a new transport protocol that is promising to reduce the connection establishment overhead while providing security properties similar to Transport Layer Security (TLS) [3]. However, without an efficient task scheduling mechanism, the high cost for encryption and decryption in QUIC can easily lead to load imbalance among multiple Central Processing Unit (CPU) cores and thus cause a high tail latency. READ MORE
-
3. Protocol-aware fuzzing of DTLS
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Communication protocols like TCP and UDP enable transfer of databetween sender and receiver during online communication. To provide security from eavesdropping, message forgery and data tampering during online communication, communication protocols likeTLS and DTLS are run on top of TCP/UDP. READ MORE
-
4. Which News Articles are You Reading? : Using Fingerprinting to Attack Internal Pages of News Websites
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : When performing fingerprinting attacks against websites in a controlled environment astudy may achieve very promising results. However, these can be misleading as the closedworld setting may not accurately represent the real-world. READ MORE
-
5. Characterization of cipher suite selection, downgrading, and other weaknesses observed in the wild
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : The importance of security on the web is growing every day. How domains handle and prioritize their level of security is varying. Tradeoffs between security and convenience have to be made to uphold a website's public image. This thesis uses a subset of domains from the Alexa Top 1M list. READ MORE