共 50 条
- [32] Using SSL/TLS in authentication and key agreement procedures of future mobile networks [J]. 2002 4TH INTERNATIONAL WORKSHOP ON MOBILE AND WIRELESS COMMUNICATION NETWORK, 2002, : 152 - 156
- [33] Integration of the digital signature in the protocol SSL/TLS [J]. ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2006, 61 (5-6): : 522 - 541
- [34] Key Vulnerabilities in SSL & TLS That Needs To Be Mitigated [J]. 2023 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, LISAT, 2023,
- [35] Security Tests for Mobile Applications - Why using TLS/SSL is not enough. [J]. 2015 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW), 2015,
- [36] Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations [J]. 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 114 - 129
- [37] HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2016, : 1 - 14
- [38] Network-based HTTPS Client Identification Using SSL/TLS Fingerprinting [J]. PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 389 - 396
- [39] Integration of the digital signature in the protocol SSL/TLS [Intégration de la signature numérique au protocole SSL/TLS] [J]. Annales Des Télécommunications, 2006, 61 (5-6): : 522 - 541
- [40] Attacking RSA-based sessions in SSL/TLS [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 426 - 440