Improved TLS protocol for platform integrity assurance using mutual attestation
Normally, secure communication between client-server applications is established using secure channel technologies such as Transport Layer Security (TLS). TLS is a cryptographic protocol which ensures secure transmission of data and authenticity of communication at each endpoint platform. However, t...
| Main Author: | Abd Aziz, Norazah |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/50054/ http://psasir.upm.edu.my/id/eprint/50054/1/FSKTM%202014%204RR_organized.pdf |
Similar Items
Extending TLS with mutual attestation for platform integrity assurance
by: Abdul Aziz, Nor Azah, et al.
Published: (2014)
by: Abdul Aziz, Nor Azah, et al.
Published: (2014)
Performance analysis for extended TLS with mutual attestation for platform integrity assurance
by: Abd Aziz, Norazah, et al.
Published: (2014)
by: Abd Aziz, Norazah, et al.
Published: (2014)
Platform Property Certificate for Property-Based Attestation Model
by: Borhan, Nazanin
Published: (2011)
by: Borhan, Nazanin
Published: (2011)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
Towards enhancing unsupervised anomaly detection by improving complexity, dimensionality and class-boundary properties
by: Babaei, Kasra
Published: (2022)
by: Babaei, Kasra
Published: (2022)
Performance analysis of OSPF and EIGRP protocols in a very dynamic network
by: Ahmed Mohammed, Abdul Nasser, et al.
Published: (2009)
by: Ahmed Mohammed, Abdul Nasser, et al.
Published: (2009)
Enhanced IP spoofing defense through clustered interdomain packet filtering strategy
by: Lee, Soon
Published: (2011)
by: Lee, Soon
Published: (2011)
Quantum key distribution protocols in transmission control protocol
by: Kamarul Aizan, Nur Hanani
Published: (2012)
by: Kamarul Aizan, Nur Hanani
Published: (2012)
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
by: Sjaugi, Muhammad Farhan
Published: (2008)
by: Sjaugi, Muhammad Farhan
Published: (2008)
A machine learning-based anomaly detection framework for connected and autonomous vehicles cyber security
by: He, Qiyi
Published: (2021)
by: He, Qiyi
Published: (2021)
Stability improved of improved low energy adaptive clustering hierarchy routing protocol for wireless sensor network
by: Sabah Talib, Al-Zubaidi Ammar
Published: (2017)
by: Sabah Talib, Al-Zubaidi Ammar
Published: (2017)
Performance of Transmission Control Protocol (TCP) Congestion Control Over Wireless Links Using Modified Snoop Protocol
by: Moojid, Furat Asmat
Published: (2003)
by: Moojid, Furat Asmat
Published: (2003)
Web-Based Network Device Monitoring Tool Using Simple Network Management Protocol (Snmp)
by: Hossen, Md.Jakir
Published: (2003)
by: Hossen, Md.Jakir
Published: (2003)
Permission extraction framework for android malware detection
by: Ghasempour, Ali
Published: (2019)
by: Ghasempour, Ali
Published: (2019)
Improved tree routing protocol in zigbee networks
by: Al-Harbawi, Mostafa Kamil Abdulhusain
Published: (2010)
by: Al-Harbawi, Mostafa Kamil Abdulhusain
Published: (2010)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)
by: Khalid, Roszelinda
Published: (2018)
Security Enhancement of Route Optimization in Mobile IPv6 Networks
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
by: Saleh, Ahmed Mohammed Shamsan
Published: (2012)
by: Saleh, Ahmed Mohammed Shamsan
Published: (2012)
Windows 10 instant messaging application forensics
by: Shehu, Aliyu Usman
Published: (2018)
by: Shehu, Aliyu Usman
Published: (2018)
Highly efficient distance-based anomaly detection through univariate with PCA in wireless sensor networks
by: Xie, Miao, et al.
Published: (2011)
by: Xie, Miao, et al.
Published: (2011)
Optimization algorithms for multipath transfer over asymmetric paths using concurrent multipath transfer stream control transmission protocol
by: Abass, Abdulridha Hanash
Published: (2016)
by: Abass, Abdulridha Hanash
Published: (2016)
Mutual remote attestation in IPSec based VPN.
by: Abd Aziz, Norazah, et al.
Published: (2012)
by: Abd Aziz, Norazah, et al.
Published: (2012)
Mutual remote attestation in IPSec based VPN
by: Abd Aziz, Norazah, et al.
Published: (2013)
by: Abd Aziz, Norazah, et al.
Published: (2013)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
Detection of cross channel anomalies from multiple data channels
by: Pham, DucSon, et al.
Published: (2011)
by: Pham, DucSon, et al.
Published: (2011)
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
by: Jahan, Mohammad Saukat
Published: (2015)
by: Jahan, Mohammad Saukat
Published: (2015)
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
by: Raja Mohd Auzar, Tengku Dian Shahida
Published: (2009)
by: Raja Mohd Auzar, Tengku Dian Shahida
Published: (2009)
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
by: Ahmad, Noor Azlan
Published: (2008)
by: Ahmad, Noor Azlan
Published: (2008)
Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol
by: Zazali, Azyyati Adiah
Published: (2024)
by: Zazali, Azyyati Adiah
Published: (2024)
Increasing TCP friendliness by implementing simple adaptive congestion control framework in wireless network
by: Elangkovan, Sri Ganesh
Published: (2018)
by: Elangkovan, Sri Ganesh
Published: (2018)
Mutual attestation and integrity verification of RFID system using trusted platform module (TPM) / Mohd Faizal Mubarak
by: Mubarak, Mohd Faizal
Published: (2010)
by: Mubarak, Mohd Faizal
Published: (2010)
New synchronization protocol for distributed system with TCP extension
by: Bayat, Peyman
Published: (2013)
by: Bayat, Peyman
Published: (2013)
An investigation and simulation of novel dynamic routing methods
by: Saleh, Mohammad
Published: (2001)
by: Saleh, Mohammad
Published: (2001)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Traffic Balancing Method in Shortest Path Routing
by: Mohamed Abdulqader, Makarem
Published: (2007)
by: Mohamed Abdulqader, Makarem
Published: (2007)
Effects of Authentication of Users in Mobile Internet Protocol Version 6
by: Obenofunde, Simon Tabi
Published: (2004)
by: Obenofunde, Simon Tabi
Published: (2004)
Comparison study of transmission control protocol and user datagram protocol behavior over multi-protocol label switching networks in case of failures.
by: Al-Radaei, Taha Ahmed, et al.
Published: (2009)
by: Al-Radaei, Taha Ahmed, et al.
Published: (2009)
A mobility management scheme for proxy mobile IPv6 wireless sensor networks
by: Ghaleb, Safwan Mahmood Yahya
Published: (2019)
by: Ghaleb, Safwan Mahmood Yahya
Published: (2019)
Similar Items
-
Extending TLS with mutual attestation for platform integrity assurance
by: Abdul Aziz, Nor Azah, et al.
Published: (2014) -
Performance analysis for extended TLS with mutual attestation for platform integrity assurance
by: Abd Aziz, Norazah, et al.
Published: (2014) -
Platform Property Certificate for Property-Based Attestation Model
by: Borhan, Nazanin
Published: (2011) -
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016) -
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)