共 50 条
- [1] SSL/TLS Attacks: Analysis and Evaluation [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, CONTROL, NETWORKING, ELECTRONICS AND EMBEDDED SYSTEMS ENGINEERING (ICCNEEE), 2015, : 203 - 208
- [2] SoK: Lessons Learned from SSL/TLS Attacks [J]. INFORMATION SECURITY APPLICATIONS, WISA 2013, 2014, 8267 : 189 - 209
- [3] A comprehensive study on security attacks on SSL/TLS Protocol [J]. PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 893 - 897
- [4] Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH [J]. 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
- [5] Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks [J]. PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 733 - 748
- [7] Cliptography: Clipping the Power of Kleptographic Attacks [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 34 - 64
- [8] Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol [J]. INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, 2015, 9247 : 274 - 285
- [9] Resilient connections for SSH and TLS [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 2006 USENIX ANNUAL TECHNICAL CONFERENCE, 2006, : 329 - +
- [10] Kleptographic Attacks on Elliptic Curve Cryptosystems [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (06): : 213 - 215