共 2 条
- [1] Inductive analysis of the Internet protocol TLS[J] . Lawrence C. Paulson.ACM Transactions on Information and System Security (TISSEC) . 1999 (3)
- [2] Mining Your Psand Qs: Detection of WidespreadWeak Keys in Network Devices .2 Heninger N,Durumeric Z,Wustrow E,Halderman J A. the21st USENIX Security Symposium . 2012