ssl protocol
Recently Published Documents


TOTAL DOCUMENTS

45
(FIVE YEARS 1)

H-INDEX

3
(FIVE YEARS 0)

Author(s):  
Silvia Melero ◽  
Alexandra Morales ◽  
José P. Espada ◽  
Xavier Méndez ◽  
Mireia Orgilés

Emotional difficulties in children are often shown to be associated with peer problems and low prosocial behaviors. Super Skills for Life (SSL) is a transdiagnostic protocol for the prevention of emotional problems in children and has also obtained improvements of other comorbid symptoms. This study aimed at comparing the effects of SSL in reducing peer problems and increasing prosocial behaviors in children aged 8 to 12 years between the group and the individual modalities. For this purpose, 140 children (35% girls) received the program, 70 in group format and 70 in individual format, and were evaluated at the baseline, posttest, and after one year. Both modalities were effective in enhancing social relationships in children, although the individual modality showed more promising results. Children belonging to the individual modality group presented fewer peer problems (less social isolation and rejection, greater social acceptance, more friends) and greater prosocial behaviors (helping, empathy, kindness, and sharing) compared to children receiving the therapy in group modality, both in the short and in the long term. In conclusion, this study provides evidence of SSL protocol efficacy for improving children’s peer relationships and prosocial behaviors and encourages the implementation of transdiagnostic interventions in both clinical and educational settings.


At the current era Security and Protection is of vital significance. While there is no system that is immune to attack, a steady and effective system-security-framework is fundamental to ensuring the protection of data. On a fundamental-level, we are living in a more technologically advanced world than we were as of a decade ago. This rise in the broad utilization of technology carried with it and ascent in network attack. Networked PCs have taken over practically all parts of our lives, they store and deal with a ton of data that whenever traded off could bring about critical results. Secure Sockets Layer and Transport Layer Security(SSL/TLS) are presently broadly embraced innovation to give security. SSL/TLS convention is made to give privacy to delicate data trade over the Web. They can be used to secure secrecy and protection however can in like manner be used to shroud vindictive exercises. Regardless, assurance right now in all the information being scrambled independent of whether the information is malignant or not. The SSL-Attackers don’t utilize a particular system for the assault, the attacker may attempt to stick the system by making superfluous-traffic. Using Anomaly-Detection-technique we find the outliers by analyzing the data-captured using Wireshark and identify any possible attack on the network. For detecting outlier in the traffic we have used ABOD technique contained in the PyOD-library, which is an open-source toolbox provided in Python for identification of anomaly on multi-variate information. Anomaly-Based-Detection is a practical and realistic option for identification of attack against securityconvention.


2019 ◽  
Vol 2019 ◽  
pp. 1-20
Author(s):  
Junwei Tang ◽  
Jingjing Li ◽  
Ruixuan Li ◽  
Hongmu Han ◽  
Xiwu Gu ◽  
...  

Android usually employs the Secure Socket Layer (SSL) protocol to protect the user’s privacy in network transmission. However, developers may misuse SSL-related APIs, which would lead attackers to steal user’s privacy through man-in-the-middle attacks. Existing methods based on static decompiling technology to detect SSL security vulnerabilities of Android applications cannot cope with the increasingly common packed applications. Meanwhile, dynamic analysis approaches have the disadvantages of excessive resource consumption and time-consuming. In this paper, we propose a dynamic method to solve this issue based on our novel automatic traversal model. At first, we propose several new traversal strategies to optimize the widget tree according to the user interface (UI) types and the interface state similarity. Furthermore, we develop a more granular traversal model by refining the traversal level from the Activity component to the Widget and implement a heuristic depth-first traversal algorithm in combination with our customized traversal strategy. In addition, the man-in-the-middle agent plug-in is extended to implement real-time attack test and return the attack results. Based on the above ideas, we have implemented SSLDetecter, an efficient automated detection system of Android application SSL security vulnerability. We apply it on multiple devices in parallel to detect 2456 popular applications in several mainstream application markets and find that 424 applications are suffering from SSL security vulnerabilities. Compared with the existing system SMV-HUNTER, the time efficiency of our system increases by 38% and the average detection rate increases by 6.39 percentage points, with many types of SSL vulnerabilities detected.


2019 ◽  
Vol 8 (2) ◽  
pp. 4770-4774

In this paper, we present a new method for solving multivariate polynomial elliptic curve equations over a finite field. The arithmetic of elliptic curve is implemented using the mathematical function trace of finite fields. We explain the approach which is based on one variable polynomial division. This is achieved by identifying the plane p with the extension of and transforming elliptic curve equations as well as line equations arising in point addition or point doubling into one variable polynomial. Hence the intersection of the line with the curve is analogous to the roots of the division between these polynomials. Hence this is the different way of computing arithmetic of elliptic curve.Transport layer security provides endto-end security services for applications that use a reliable transport layer protocol such as TCP. Two Protocols are dominant today for providing security at the transport layer, the secure socket layer (SSL) protocol and transport layer security (TLS) protocol. One of the goals of these protocols is to provide server and client authentication, data confidentiality and data integrity. The above goals are achieved by establishing the keys between server and client, the algorithm is called elliptic curve digital signature algorithm (ECDSA) and elliptic curve DiffieHellman (ECDH). These algorithms are implemented using standard for efficient cryptography(SEC) prime field elliptic curve secp-384r1 currently specified in NSA Suite B Cryptography. The algorithm is verified on elliptic curve secp384r1and is shown to be adaptable to perform computation


2019 ◽  
pp. 435-445
Author(s):  
Prakash Mohan ◽  
Saravanakumar Chelliah

Objective: The main aim is to de-duplicate the redundant files in the cloud and also to improve the security of files in public cloud service by assigning privileges to the documents when it is uploaded by confidential user. Methods: To achieve the objective the authors have used the AES algorithm to encrypt the file stored after de-duplication in the cloud. De-duplication is done based on comparison of contents, file type and size. For an authorized user to access the file from the cloud, generation of OTP using SSL protocol is adopted. Findings: Files uploaded in the cloud are encrypted using traditional encryption algorithms which don't provide high levels of security. Files can be accessed by anyone who is authorized. Privileges are not considered. During de-duplication, only the name and size of the files are considered. Application: Files within the public cloud can't be viewed by everyone who has registered with the cloud. Those who have the respective privileges can only view the file. Proof of Ownership is assured. Since de-duplication is done based on the content redundancy within the cloud storage is avoided. Usage of OTP ensures that the content is viewed by the individuals who have the respective privileges related to the file. These concepts provide additional security to the files stored in the public environment.


2018 ◽  
Vol 08 (05) ◽  
pp. 709-720
Author(s):  
兴兰 张
Keyword(s):  

2017 ◽  
Vol 11 (2) ◽  
pp. 1-10 ◽  
Author(s):  
Prakash Mohan ◽  
Saravanakumar Chelliah

Objective: The main aim is to de-duplicate the redundant files in the cloud and also to improve the security of files in public cloud service by assigning privileges to the documents when it is uploaded by confidential user. Methods: To achieve the objective the authors have used the AES algorithm to encrypt the file stored after de-duplication in the cloud. De-duplication is done based on comparison of contents, file type and size. For an authorized user to access the file from the cloud, generation of OTP using SSL protocol is adopted. Findings: Files uploaded in the cloud are encrypted using traditional encryption algorithms which don't provide high levels of security. Files can be accessed by anyone who is authorized. Privileges are not considered. During de-duplication, only the name and size of the files are considered. Application: Files within the public cloud can't be viewed by everyone who has registered with the cloud. Those who have the respective privileges can only view the file. Proof of Ownership is assured. Since de-duplication is done based on the content redundancy within the cloud storage is avoided. Usage of OTP ensures that the content is viewed by the individuals who have the respective privileges related to the file. These concepts provide additional security to the files stored in the public environment.


2016 ◽  
Vol 28 (3) ◽  
pp. 790-798
Author(s):  
Kadek Restu Yani ◽  
Yoga Priyana ◽  
Pranoto H. Rusmin ◽  
Kyung-Hyune RHEE
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document