Sökning: "Transport layer security"
Visar resultat 1 - 5 av 38 uppsatser innehållade orden Transport layer security.
1. Low-latency transport protocols inactor systems : Performance evaluation of QUIC in Kompact
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Developers widely use actor frameworks to build highly distributed systems. However, modern actor frameworks are limited in their network implementations, with Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) being the main protocols used for network communication. LÄS MER
2. Design and evaluation of an inter-core QUIC connection migration approach for intra-server load balancing
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : With the emergence of novel cloud applications and their critical latency demand [1], Quick UDP Internet Connection (QUIC) [2] was proposed as a new transport protocol that is promising to reduce the connection establishment overhead while providing security properties similar to Transport Layer Security (TLS) [3]. However, without an efficient task scheduling mechanism, the high cost for encryption and decryption in QUIC can easily lead to load imbalance among multiple Central Processing Unit (CPU) cores and thus cause a high tail latency. LÄS MER
3. Protocol-aware fuzzing of DTLS
Master-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : Communication protocols like TCP and UDP enable transfer of databetween sender and receiver during online communication. To provide security from eavesdropping, message forgery and data tampering during online communication, communication protocols likeTLS and DTLS are run on top of TCP/UDP. LÄS MER
4. Which News Articles are You Reading? : Using Fingerprinting to Attack Internal Pages of News Websites
Master-uppsats, Linköpings universitet/Institutionen för datavetenskapSammanfattning : When performing fingerprinting attacks against websites in a controlled environment astudy may achieve very promising results. However, these can be misleading as the closedworld setting may not accurately represent the real-world. LÄS MER
5. Characterization of cipher suite selection, downgrading, and other weaknesses observed in the wild
Kandidat-uppsats, Linköpings universitet/Institutionen för datavetenskapSammanfattning : The importance of security on the web is growing every day. How domains handle and prioritize their level of security is varying. Tradeoffs between security and convenience have to be made to uphold a website's public image. This thesis uses a subset of domains from the Alexa Top 1M list. LÄS MER