نتایج جستجو برای: tls traffic analysis

تعداد نتایج: 2901176  

2011
Chunhua Chen Chris J. Mitchell Shaohua Tang

Most SSL/TLS-based electronic commerce (e-commerce) applications (including Internet banking) are vulnerable to man in the middle attacks. Such attacks arise since users are often unable to authenticate a server effectively, and because user authentication methods are typically decoupled from SSL/TLS session establishment. Cryptographically binding the two authentication procedures together, a ...

Journal: :Trans. GIS 2014
Jayson J. Murgoitio Rupesh Shrestha Nancy F. Glenn Lucas P. Spaete

Research presented here explores the feasibility of leveraging vegetation data derived from airborne light detection and ranging (LiDAR) and terrestrial laser scanning (TLS) for visibility modeling. Using LiDAR and TLS datasets of a lodgepole pine (Pinus contorta) dominant ecosystem, tree canopy and trunk obstructions were isolated relevant to a discrete visibility beam in a short-range line-of...

2012
Noam Diamant Ayal Hendel Ilan Vered Thomas Carell Thomas Reißner Niels de Wind Nicholas Geacinov Zvi Livneh

Translesion DNA synthesis (TLS) employs low-fidelity DNA polymerases to bypass replication-blocking lesions, and being associated with chromosomal replication was presumed to occur in the S phase of the cell cycle. Using immunostaining with anti-replication protein A antibodies, we show that in UV-irradiated mammalian cells, chromosomal single-stranded gaps formed in S phase during replication ...

2016
Kouji Hirota Masataka Tsuda Mohiuddin Toshiki Tsurimoto Isadora S. Cohen Zvi Livneh Kaori Kobayashi Takeo Narita Kana Nishihara Junko Murai Shigenori Iwai Guillaume Guilbaud Julian E. Sale Shunichi Takeda

The intolerance of DNA polymerase δ (Polδ) to incorrect base pairing contributes to its extremely high accuracy during replication, but is believed to inhibit translesion synthesis (TLS). However, chicken DT40 cells lacking the POLD3 subunit of Polδ are deficient in TLS. Previous genetic and biochemical analysis showed that POLD3 may promote lesion bypass by Polδ itself independently of the tra...

Terrestrial Laser Scanner (TLS) technology, have altered quickly data acquisition for map production in surveying. In many cases, it is impossible to complete surveying of the desired area without TLS displacement in one station to another. Occlusion is innate in data acquisition, with this type of device. To solve this problem, TLS devices should be placed in different locations and scanning o...

Journal: :RFC 2013
Paul Sangster Nancy Cam-Winget Joseph Salowey

This document specifies PT-TLS, a TLS-based Posture Transport (PT) protocol. The PT-TLS protocol carries the Network Endpoint Assessment (NEA) message exchange under the protection of a Transport Layer Security (TLS) secured tunnel.

Journal: :Journal of clinical oncology : official journal of the American Society of Clinical Oncology 2008
Bertrand Coiffier Arnold Altman Ching-Hon Pui Anas Younes Mitchell S Cairo

PURPOSE Tumor lysis syndrome (TLS) has recently been subclassified into either laboratory TLS or clinical TLS, and a grading system has been established. Standardized guidelines, however, are needed to aid in the stratification of patients according to risk and to establish prophylaxis and treatment recommendations for patients at risk or with established TLS. METHODS A panel of experts in pe...

2015
Markulf Kohlweiss Ueli Maurer Cristina Onete Björn Tackmann Daniele Venturi

SSL/TLS is one of the most widely deployed cryptographic protocols on the Internet. It is used to protect the confidentiality and integrity of transmitted data in various client-server applications. The currently specified version is TLS 1.2, and its security has been analyzed extensively in the cryptographic literature. The IETF working group is actively developing a new version, TLS 1.3, whic...

2016
Boyuan He Vaibhav Rastogi Yinzhi Cao Yan Chen V. N. Venkatakrishnan Chunlin Xiong Runqing Yang Zhenrui Zhang

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols have become the security backbone of the Web and Internet today. Many systems including mobile and desktop applications are protected by SSL/TLS protocols against network attacks. However, many vulnerabilities caused by incorrect use of SSL/TLS APIs have been uncovered in recent years. Such vulnerabilities, many of which ar...

2013
Yong Liu An-Qiang Zhang Lin Cao Hong-Tao Xia Jun-Jie Ma

BACKGROUND Catheter-related bloodstream infections (CRBSIs) are a significant cause of morbidity and mortality in critically ill patients, contributing to prolonged hospital stays and increased costs. Whether taurolidine lock solutions (TLS) are beneficial for the prevention of CRBSIs remains controversial. In this meta-analysis, we aim to assess the efficacy of TLS for preventing CRBSIs. MET...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید