TLS Protocol: Secure Protocol With Client Puzzles
Journal Title: Acta Technica Napocensis- Electronica-Telecomunicatii (Electronics and Telecommunications) - Year 2010, Vol 51, Issue 2
Abstract
Client puzzles are commonly proposed as a solution to denial-of-service attacks. We analyzed the TLS protocol and implement Client Puzzles algorithm. We pursued the following objectives: analyze TLS handshake protocol and implement Client Puzzles algorithm using Hash Functions, Diffie-Hellman Base Puzzle Scheme and Threshold Puzzles. The originality of the paper is due to a comparative study of methods used to create the Client Puzzle solution. We also present measurements of execution time when our modified protocol is under attack.
Authors and Affiliations
Raluca CATARGIU, Monica BORDA
Zigbee Solution for Telemedicine Applications
The paper addresses several aspects regarding wireless communications in telemedicine applications. Possible solutions and comparisons between different technologies are presented. A ZigBee based implementation case stu...
Decisions Tools In Signal Processing: A Stochastic Dominance Perspective
The aim of this paper is to provide an implementation of a stochastic dominance algorithm that establish which of the two distributions is preferred by individuals who have an aversive risk profile. Although, this topic...
Robust Feature Sets for the Speech Processing
This paper compares the various feature sets for speech signal such as cepstral-based and acoustically-driven parameters to analyze and see how robust they are in different noise environments. Despite the success of the...
Resolution Improvement of Ultrasound Images Using Deconvolution and Super-Resolution Algorithms
Ultrasound imaging is a wide spread technique used to view body soft tissues, like tendons, muscle or internal organs for possible problems. These images are achieved by capturing the returned acoustic waves using an ult...
Secret Writing by DNA Hybridization
This paper presents an original algorithm of secret writing by DNA hybridization, based on existing ideas described in the literature. In order to perform highly secure communication, the cryptographic, steganographic an...