共 50 条
- [1] Implementation of a Security Layer for the SSL/TLS Protocol [J]. 2010 9TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2010, : 209 - 212
- [2] Implementation of SSL/TLS Security with MQTT Protocol in IoT Environment [J]. Wireless Personal Communications, 2023, 132 : 163 - 182
- [3] Planning-based Security Testing of the SSL/TLS Protocol [J]. 10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 347 - 355
- [5] SSL/TLS Attacks: Analysis and Evaluation [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, CONTROL, NETWORKING, ELECTRONICS AND EMBEDDED SYSTEMS ENGINEERING (ICCNEEE), 2015, : 203 - 208
- [6] Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol [J]. INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, 2015, 9247 : 274 - 285
- [7] Research on Security of the Extended SSL/TLS Protocol Based on Trusted Platform Module [J]. ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 861 - 866
- [8] SoK: Lessons Learned from SSL/TLS Attacks [J]. INFORMATION SECURITY APPLICATIONS, WISA 2013, 2014, 8267 : 189 - 209
- [9] New key management protocol for SSL/TLS [J]. NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY II, 2003, 133 : 251 - 262
- [10] Stealing secrets with SSL/TLS and SSH -: Kleptographic attacks [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 191 - +