نتایج جستجو برای: tls traffic analysis

تعداد نتایج: 2901176  

2008
M. Pešta

Total least squares (TLS) is a data modelling technique which can be used for many types of statistical analysis, e.g. a regression. In the regression setup, both dependent and independent variables are considered to be measured with errors. Thereby, the TLS approach in statistics is sometimes called an errors-invariables (EIV) modelling and, moreover, this type of regression is usually known a...

2015
Hugo Krawczyk Hoeteck Wee

We present the OPTLS key-exchange protocol, its design, rationale and cryptographic analysis. OPTLS design has been motivated by the ongoing work in the TLS working group of the IETF for specifying TLS 1.3, the next-generation TLS protocol. The latter effort is intended to revamp the security of TLS that has been shown inadequate inmany instances as well as to add new security and functional fe...

2016
Mohammad Omidalizarandi Jens-André Paffenholz Ulrich Stenz Ingo Neumann

In the current state-of-the-art, monitoring and analysis of shortand long-term deformations of natural and artificial objects (e.g. dams, bridges, towers, landslides,...) has received increasing interest by researchers and operators who are involved in this field of Geodetic science and engineering. In order to improve the accuracy of deformation monitoring and analysis, terrestrial laser scann...

2001
Christopher C. Paige Zdeněk Strakoš

The standard approaches to solving overdetermined linear systems Ax ≈ b construct minimal corrections to the data to make the corrected system compatible. In ordinary least squares (LS) the correction is restricted to the right hand side b, while in scaled total least squares (Scaled TLS) [10; 7] corrections to both b and A are allowed, and their relative sizes are determined by a real positive...

Journal: :ACM Transactions on Internet Technology 2023

Privacy on the Internet has become a priority, and several efforts have been devoted to limit leakage of personal information. Domain names, both in TLS Client Hello DNS traffic, are among last pieces information still visible an observer network. The Encrypted extension for TLS, over HTTPS or QUIC protocols aim further increase network confidentiality by encrypting domain names visited servers...

Journal: :Haematologica 2008
Pau Montesinos Ignacio Lorenzo Guillermo Martín Jaime Sanz Maria Luz Pérez-Sirvent David Martínez Guillermo Ortí Lorenzo Algarra Jesus Martínez Federico Moscardó Javier de la Rubia Isidro Jarque Guillermo Sanz Miguel A Sanz

BACKGROUND Despite the prophylactic use of allopurinol, tumor lysis syndrome (TLS)-related morbidity and mortality still occur in a number of patients with acute myeloid leukemia (AML). The aim of this study was: (i) to analyze the incidence and outcome of TLS in a large series of patients with AML receiving hyperhydration and allopurinol, (ii) to identify risk factors for TLS, and (iii) to dev...

2015
Michelle K. Scotland Justin M. H. Heltzel James E. Kath Jung-Suk Choi Anthony J. Berdis Joseph J. Loparo Mark D. Sutton Ivan Matic

Translesion DNA synthesis (TLS) by specialized DNA polymerases (Pols) is a conserved mechanism for tolerating replication blocking DNA lesions. The actions of TLS Pols are managed in part by ring-shaped sliding clamp proteins. In addition to catalyzing TLS, altered expression of TLS Pols impedes cellular growth. The goal of this study was to define the relationship between the physiological fun...

2016
Liang Zhu Johanna Amann John S. Heidemann

Today, Transport-Layer Security (TLS) is the bedrock of Internet security for the web and web-derived applications. TLS depends on the X.509 Public Key Infrastructure (PKI) to authenticate endpoint identity. An essential part of a PKI is the ability to quickly revoke certificates, for example, after a key compromise. Today the Online Certificate Status Protocol (OCSP) is the most common way to ...

Journal: :CoRR 2014
Emmanuel Dreyfus

This document presents TLS and how to make it secure enough as of 2014 Spring. Of course all the information given here will rot with time. Protocols known as secure will be cracked and will be replaced with better versions. Fortunately we will see that there are ways to assess the current security of your setup, but this explains why you may have to read further from this document to get the u...

2013
L Fan J Smethurst W Powrie

In temperate European climates, soil water removal due to vegetation transpiration peaks in summer and soil rewetting from higher levels of precipitation occurs in winter. In clays of high plasticity, the seasonal cycles of drying and wetting cause the soil to experience a volumetric change, resulting in seasonal shrinking and swelling. For a clay slope exhibiting volume change, such behaviour ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید