共 50 条
- [1] SSH as an Alternative to TLS in IoT Environments using HTTP [J]. 2018 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2018, : 19 - 24
- [2] Resilient connections [J]. VITRUVIO-INTERNATIONAL JOURNAL OF ARCHITECTURAL TECHNOLOGY AND SUSTAINABILITY, 2021, 6 (01): : 24 - 37
- [3] Stealing secrets with SSL/TLS and SSH -: Kleptographic attacks [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 191 - +
- [4] Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH [J]. 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
- [6] SSH - Secure login connections over the Internet [J]. PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, 1996, : 37 - 42
- [8] Usability Insights from Establishing TLS Connections [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (SEC 2022), 2022, 648 : 289 - 305
- [9] Enhancement in SNMP Services with Improved Security with the Impact of SSH, TLS and DTLS Protocols [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 888 - 895
- [10] Safe Configuration of TLS Connections Beyond Default Settings [J]. 2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 415 - 422