Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 220,989,152 papers from all fields of science
Search
Sign In
Create Free Account
GnuTLS
Known as:
GNU TLS
GnuTLS (/ˈɡnuː ˌtiː ˌɛl ˈɛs/, the GNU Transport Layer Security Library) is a free software implementation of the TLS, SSL and DTLS protocols. It…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Application programming interface
Application-Layer Protocol Negotiation
Comparison of TLS implementations
Comparison of web server software
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Weighted Combinatorial Sequence Testing for the TLS Protocol
Bernhard Garn
,
D. Simos
,
Feng Duan
,
Yu Lei
,
Josip Bozic
,
F. Wotawa
International Conference on Software Testing…
2019
Corpus ID: 174819584
In this paper, we apply the notion of weighted t-way sequences to derive sequence test cases for testing implementations of the…
Expand
2017
2017
Research on the Underlying Method of Elliptic Curve Cryptography
Xianjin Fang
,
Gaoming Yang
,
Yanting Wu
International Conference on Information Science…
2017
Corpus ID: 40064677
Elliptic Curve Cryptography (ECC) is a promising public key cryptography, probably takes the place of RSA. Not only ECC uses less…
Expand
2016
2016
Extending TLS with KMIP Protocol for Cloud Computing
M. Msahli
,
A. Serhrouchni
,
M. Badra
International Conference on New Technologies…
2016
Corpus ID: 17170897
Any information system using encryption tends to have its own key management infrastructure. In practice, we find a separate key…
Expand
2015
2015
GnuTLS Reference Manual
Nikos Mavrogiannopoulos
,
S. Josefsson
,
+4 authors
A. McDonald
2015
Corpus ID: 64222272
GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides…
Expand
2014
2014
Mind your Language(s) A discussion about languages and security (Long Version)
´Eric Jaeger
,
O. Levillain
,
Pierre Chifflier
2014
Corpus ID: 260443710
—Following several studies conducted by the French Network and Information Security Agency ( A NSSI ), this paper discusses the…
Expand
2014
2014
Rollback mechanism of nested virtual machines for protocol fuzz testing
K. Suzaki
,
T. Yagi
,
Akira Tanaka
,
Y. Oiwa
,
Etsuya Shibayama
ACM Symposium on Applied Computing
2014
Corpus ID: 16367199
Secure communications (HTTPS, SSH, etc) are important in the current Internet services. Implementations of secure protocols…
Expand
2008
2008
On the Adequacy of Statecharts as a Source of Tests for Cryptographic Protocols
K. R. Jayaram
,
A. Mathur
32nd Annual IEEE International Computer Software…
2008
Corpus ID: 16348795
The effectiveness of statecharts as a tool to express the desired behavior of security protocols and a source of tests for their…
Expand
2007
2007
A New Variant for an Attack Against RSA Signature Verification Using Parameter Field
Y. Oiwa
,
K. Kobara
,
Hajime Watanabe
European Public Key Infrastructure Workshop
2007
Corpus ID: 21327530
We present a method to create a forged signature which will be verified to a syntactically well-formed ASN.1 datum, when…
Expand
2007
2007
Adequacy of Statecharts as a Source of Tests for Implementations of Cryptographic Protocols
K. R. Jayaram
,
A. Mathur
2007
Corpus ID: 17704402
Statecharts, now an integral part of the Unified Modeling Language (UML), serve as a requirement and/or a design specification…
Expand
2004
2004
Integrating a Signature Module in SSL/TLS
I. Hajjeh
,
A. Serhrouchni
International Conference on E-Business and…
2004
Corpus ID: 38589660
SSL/TLS is currently the most deployed security protocol on the Internet. SSL/TLS provides end-to-end secure communications…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE