Transport Layer Security Protocol

1Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Authenticated key exchange protocols are at the core of Internet security protocols: they authenticate one or more of the parties communicating, and provide the establishment of a session key that is then used to encrypt application data. There are several protocols in widespread use to secure various applications. The most prominent are the following.

Cite

CITATION STYLE

APA

Boyd, C., Mathuria, A., & Stebila, D. (2020). Transport Layer Security Protocol. In Information Security and Cryptography (pp. 241–288). Springer International Publishing. https://doi.org/10.1007/978-3-662-58146-9_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free