共 50 条
- [1] TLS PROTOCOL: SECURE PROTOCOL WITH CLIENT PUZZLES [J]. 2010 9TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2010, : 149 - 152
- [2] Enabling VPN and secure remote access using TLS protocol [J]. WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 308 - +
- [3] Secure Authentication Using Biometric Templates in Kerberos [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1247 - 1250
- [5] On Using TLS to Secure In-Vehicle Networks [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
- [6] Safe and Secure Communication Using SSL/TLS [J]. 2024 International Conference on Emerging Smart Computing and Informatics, ESCI 2024, 2024,
- [7] TLS Protocol: Improvement Using Proxies [J]. 2012 10TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS, 2012, : 151 - 154
- [8] EMV-TLS, a Secure Payment Protocol For NFC Enabled Mobiles [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS (CTS), 2014, : 203 - 210
- [9] A Secure Framework to Authenticate Remotely Digital Documents based on The TLS Protocol [J]. WORLD CONGRESS ON ENGINEERING - WCE 2013, VOL II, 2013, : 1264 - +
- [10] Security Analysis of the Kerberos protocol using BAN logic [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 467 - +