فهرست و منابع پایان نامه پروتکل های امنیتی اینترنت SSL و TLS
فهرست:
فصل اول
پروتکل اینترنت........................................................................................................................................... 1
تاریخچه.......................................................................................................................................................... 2
پروتکل ها...................................................................................................................................................... 4
تست IPTV و تحلیل امنیتی آن...................................................................................................... 5
نقش یک پروتکل اینترنتی.................................................................................................................... 10
ایجاد یک پروتکل جدید........................................................................................................................ 12
آدرس دهی................................................................................................................................................... 13
فصل دوم
پروتکل TCP/IP..................................................................................................................................... 16
مشخص نمودن برنامه.............................................................................................................................. 21
ارسال اطلاعات با استفاده از TCP................................................................................................... 24
مفاهیم اولیه................................................................................................................................................. 30
مشکلات امنیتی.......................................................................................................................................... 36
حل مشکلات امنیتی................................................................................................................................ 42
لایه SSL Record............................................................................................................................... 45
لایه SSL Handshake.................................................................................................................... 46
پروتکل های امنیتی SSL.................................................................................................................... 52
مکانیزم های تشکیل دهنده SSL.................................................................................................... 53
اجزای پروتکل SSL............................................................................................................................... 55
الگوریتم های رمزنگاری پشتیبانی شده در SSL.................................................................... 56
نمایش قفل امنیت SSL....................................................................................................................... 59
SSL چیست؟............................................................................................................................................ 65
آشنایی با پروتکل SSL و عملکرد آن............................................................................................. 66
حملات تاثیر گذار بر SSL................................................................................................................... 75
منابع و مراجع............................................................................................................................................. 84
.
منبع:
[1]Bo Sheng, Qun Li, and Weizhen Mao. Data Storage Placement in sensor networks ,ACM Mobihoc 2006, Florence, Italy, May 22-25, 2006,
[2]B. Bonfils,.P. Bonnet , Adaptive and Decentralized Operator Placement for In-Network Query Processing ,2003, springer verlag .
[3]S. Bhattacharya, H. Kim, S. Prabh, and T. Abdelzaher. Energy-conserving data placement and asynchronous multicast in wireless sensor networks. In Proceedings of the 1st international conference on Mobile systems, applications and services, pages 173–185, New York, NY, USA, 2003. ACM Press.
[4]H. S. Kim, T. F. Abdelzaher, and W. H. Kwon. Minimum-energy asynchronous dissemination to mobile sinks in wireless sensor networks. In Proceedings of the 1st international conference on Embedded networked sensor systems, pages 193–204, New York, NY, USA, 2003. ACM Press.
[5] A. Trigoni, Y. Yao, A. Demers, J. Gehrke and R. Rajaraman. Multi-Query Optimization for Sensor Networks. in the International Conference on Distributed Processing on Sensor Systems (DCOSS), 2005.
[6]Madden S., Franklin M.J., Hellerstein J.M., Hong W., The Design of an Acquisitional Query Processor For Sensor Networks, Proc. Int. Conf. on Management of Data (SIGMOD), San Diego (USA), 2003.
[7] P. Bonnet, J. Gehrke, P. Seshadri, Towards Sensor Database Systems, Lecture Notes in Computer Science, 2001, Springer Verlag
.