共 50 条
- [41] Stealing secrets with SSL/TLS and SSH -: Kleptographic attacks [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 191 - +
- [42] A comprehensive study on security attacks on SSL/TLS Protocol [J]. PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 893 - 897
- [43] A technique to circumvent SSL/TLS validations on iOS devices [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 74 : 366 - 374
- [44] On the robustness of applications based on the SSL and TLS security Protocols [J]. PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 248 - +
- [45] Investigation of the Applicability of SSL/TLS Protocol for VPN in APCS [J]. PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2018, : 1318 - 1321
- [47] Analysis and Comparison of Several algorithms in SSL/TLS Handshake Protocol [J]. ITCS: 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, PROCEEDINGS, VOL 2, PROCEEDINGS, 2009, : 613 - +
- [48] A Hybrid Method for Service Identification of SSL/TLS Encrypted Traffic [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 250 - 253
- [49] Towards Best Secure Coding Practice for Implementing SSL/TLS [J]. IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 1 - 6
- [50] Guided Differential Testing of Certificate Validation in SSL/TLS Implementations [J]. 2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, 2015, : 793 - 804