Three layer mathematical modelling of an elastic artery without and with aneurysm to predict the behavior

Download
2015
Jodati, Hossein
Today, secure communication channels are mostly set up via certificate-based protocols, such as Secure Sockets Layer (SSL) and Transport Layer Security (TLS). Although they have been used for years and in so many areas, from e-commerce and internet banking to secure channel needs in military, there have been several attacks on their security model, which forced researchers to make studies on them. In this thesis, we will explain their security model, the vulnerabilities discovered so far, the precautions for these vulnerabilities and at the end, we will focus on SSL authentication piece and the popular solutions for improving SSL server authentication, such as Certificate Pinning, Convergence and Certificate Transparency which are all in the active research area to define the future of SSL and TLS protocols.

Suggestions

Security of certificate-based protocols: focus on server authentication
Baran, Selim; Özbudak, Ferruh; Selçuk, Ali Aydın; Department of Cryptography (2015)
Today, secure communication channels are mostly set up via certificate-based protocols, such as Secure Sockets Layer (SSL) and Transport Layer Security (TLS). Although they have been used for years and in so many areas, from e-commerce and internet banking to secure channel needs in military, there have been several attacks on their security model, which forced researchers to make studies on them. In this thesis, we will explain their security model, the vulnerabilities discovered so far, the precautions fo...
Analysis of recent attacks on SSL/TLS protocols
Özden, Duygu; Cenk, Murat; Department of Cryptography (2016)
Transport Layer Security(TLS) and its predecessor Secure Socket Layer(SSL) are two important cryptographic, certificate based protocols that satisfy secure communication in a network channel. They are widely used in many areas such as online banking systems, online shopping, e-mailing, military systems or governmental systems. Being at the center of secure communication makes SSL and TLS become the target of attackers and an important field of study for researchers. So many vulnerabilities and attacks towar...
A Random Access Scheme for Large Scale 5G/IoT Applications
Balevi, Eren; Gitlin, Richard D. (2018-01-01)
The integration of slotted Aloha with power domain non-orthogonal multiple access (NOMA), dubbed slotted Aloha-NOMA (SAN) can emerge as an appealing MAC protocol to be used for Internet-of-Things (IoT) applications over 5G networks. In this paper, SAN is discussed, and its performance is evaluated in detail. The simulation results demonstrate that the maximum normalized throughput can be increased from 0.37, which is the case for slotted Aloha, to 1 by means of SAN. Specifically, this full throughput effici...
A Decision Support System for Optimal Selection of Enterprise Information Security Preventative Actions
Sonmez, Ferda Ozdemir; Günel Kılıç, Banu (2021-09-01)
Types and complexity of information security related vulnerabilities are growing rapidly and present numerous challenges to the enterprises. One of the key challenges is to identify the optimal set of precautions with limited budget. Despite the fact that majority of enterprises have a budget constraint for installing and maintaining the protection systems, the majority of the previous work only focus on prioritization of security targets and do not consider the preventative actions and budget constraints. ...
Analysis of Password Attacks From The Perspective Of The Attacker By Multiple Honeypots
Aydın, Kıvanç; Acartürk, Cengiz; Department of Cybersecurity (2021-8-19)
Authentication is vital for secure operation of ICT systems. Since the past several decades, alternative solutions have been developed for authentication, such as biometric authentication methods, aiming at replacing passwords. Nevertheless, their success has been limited as evidenced by intensive use of passwords. Today, an average user uses dozens of different passwords in daily practice. The frequent use of passwords in authentication also leads to a close interest of attackers due to rapid the expansion...
Citation Formats
H. Jodati, “Three layer mathematical modelling of an elastic artery without and with aneurysm to predict the behavior,” M.S. - Master of Science, Middle East Technical University, 2015.