2006
DOI: 10.17487/rfc4346
|View full text |Cite
|
Sign up to set email alerts
|

The Transport Layer Security (TLS) Protocol Version 1.1

Abstract: Status of This MemoThis document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
329
0
8

Year Published

2007
2007
2018
2018

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 835 publications
(337 citation statements)
references
References 1 publication
0
329
0
8
Order By: Relevance
“…DTLS (Kothmayr, 2013;Rescorla and Modadugu, 2006;Fischl et al, 2010;Hartke and Tschofenig, 2014;Kothmayr et al, 2012) is in practice with TLS (Modadugu and Rescorla, 2004;Dierks and Rescorla, 2006) with added features to compact with the untrustworthy nature of UDP communications. AES/CCM is accepted as the cryptographic algorithm, to upkeep fundamental security necessities in the current CoAP Shelby et al, 2012Shelby et al, , 2014 specification.…”
Section: Present Scenarios and Motivationsmentioning
confidence: 99%
“…DTLS (Kothmayr, 2013;Rescorla and Modadugu, 2006;Fischl et al, 2010;Hartke and Tschofenig, 2014;Kothmayr et al, 2012) is in practice with TLS (Modadugu and Rescorla, 2004;Dierks and Rescorla, 2006) with added features to compact with the untrustworthy nature of UDP communications. AES/CCM is accepted as the cryptographic algorithm, to upkeep fundamental security necessities in the current CoAP Shelby et al, 2012Shelby et al, , 2014 specification.…”
Section: Present Scenarios and Motivationsmentioning
confidence: 99%
“…It is RECOMMENDED that TLS [7] be used between elements to provide hop-by-hop confidentially protection. Furthermore, S/MIME MAY be used for integrity and authenticity of SUBSCRIBE and NOTIFY requests.…”
Section: Examplesmentioning
confidence: 99%
“…Use over TLS XPC may be tunneled over TLS [4] by establishing a TLS session immediately after a TCP session is opened and before any blocks are sent. This type of session is known as XPCS.…”
Section: Closing Sessions Due To An Errormentioning
confidence: 99%
“…14. Security Considerations Implementers should be fully aware of the security considerations given by IRIS [1] and TLS [4]. With respect to server authentication with the use of TLS, see Section 6 of IRIS-BEEP [2].…”
Section: Closing Sessions Due To An Errormentioning
confidence: 99%