Search Results - (( java application pollination algorithm ) OR ( software certification process algorithm ))

  • Showing 1 - 2 results of 2
Refine Results
  1. 1

    Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure by Nayeem Ahmad, Khan, Adnan Shahid, Khan, Seleviawati, Tarmizi, Azlina, Ahmadi Julaihi, Zeeshan, Ahmad

    Published 2022
    “…In order to prevent such types of attacks, a Public Key Infrastructure (PKI) method is proposed in this study for encapsulating messages between the client and the server while doing the TLS handshake process. The proposed method removes the need for credentials, including client-server certificates and client-server key exchange.…”
    Get full text
    Get full text
    Get full text
    Proceeding
  2. 2