Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
147 | Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo Rodenhaeuser, Bruno Kaiser |
A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
KiVS ![In: Kommunikation in Verteilten Systemen (KiVS), 15. Fachtagung Kommunikation in Verteilten Systemen, KiVS 2007, Bern, Schweiz, 26. Februar - 2. März 2007, pp. 225-236, 2007, Springer, 978-3-540-69961-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
140 | Diana Berbecaru, Antonio Lioy |
On the Robustness of Applications Based on the SSL and TLS Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 248-264, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
MITM attack, security, SSL/TLS, truncation attack |
123 | André Adelsbach, Sebastian Gajek, Jörg Schwenk |
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 204-216, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
121 | Nau Okamoto, Shigetomo Kimura, Yoshihiko Ebihara |
An Introduction of Compression Algorithms into SSL/TLS and Proposal of Compression Algorithms Specialized for Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 17th International Conference on Advanced Information Networking and Applications (AINA'03), March 27-29, 2003, Xi'an, China, pp. 817-820, 2003, IEEE Computer Society, 0-7695-1906-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
112 | Kevin J. Ma, Radim Bartos |
Analysis of Transport Optimization Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2006 IEEE International Conference on Web Services (ICWS 2006), 18-22 September 2006, Chicago, Illinois, USA, pp. 611-620, 2006, IEEE Computer Society, 0-7695-2669-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
112 | Vorapranee Khu-smith, Chris J. Mitchell |
Using GSM to enhance e-commerce security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop Mobile Commerce ![In: Proceedings of the 2nd International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 28, 2002, pp. 75-81, 2002, ACM, 1-58113-600-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
GSM security, mobile or Internet payment protocol, E-commerce security |
106 | Mohammed Assora, James Kadirire, Ayoub Shirvani |
Using WPKI for Security of Web Transaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 8th International Conference, EC-Web 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 11-20, 2007, Springer, 978-3-540-74562-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Web transaction security, wireless security services, digital signature, SSL/TLS |
106 | Mohammed Assora, Ayoub Shirvani |
Enhancing the Security and Efficiency of 3-D Secure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 489-501, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
3-D Secure, password based authentication and key exchange, online transaction security, SSL/TLS |
99 | Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Martin Vuagnoux |
Password Interception in a SSL/TLS Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 583-599, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
99 | Vlastimil Klíma, Ondrej Pokorný, Tomás Rosa |
Attacking RSA-Based Sessions in SSL/TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings, pp. 426-440, 2003, Springer, 3-540-40833-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
99 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis |
Using SSL/TLS in authentication and key agreement procedures of future mobile networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MWCN ![In: Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, MWCN 2002, September 9-11, 2002, Stockholm, Sweden, pp. 152-156, 2002, IEEE. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
98 | Homin K. Lee, Tal Malkin, Erich M. Nahum |
Cryptographic strength of ssl/tls servers: current and recent practices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, IMC 2007, San Diego, California, USA, October 24-26, 2007, pp. 83-92, 2007, ACM, 978-1-59593-908-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
network security, servers, ssl |
90 | Jianguo Zhang, Fenghai Yu, Jianyong Sun, Yuanyuan Yang, Chenwen Liang |
DICOM Image Secure Communications With Internet Protocols IPv6 and IPv4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Technol. Biomed. ![In: IEEE Trans. Inf. Technol. Biomed. 11(1), pp. 70-80, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
90 | Lars Völker, Marcus Schöller |
Secure TLS: Preventing DoS Attacks with Lower Layer Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KiVS ![In: Kommunikation in Verteilten Systemen (KiVS), 15. Fachtagung Kommunikation in Verteilten Systemen, KiVS 2007, Bern, Schweiz, 26. Februar - 2. März 2007, pp. 237-248, 2007, Springer, 978-3-540-69961-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
90 | Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle |
The Design and Implementation of Protocol-Based Hidden Key Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 165-179, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
89 | Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon, KyoungSoo Park |
Accelerating SSL with GPUs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 437-438, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
GPU, CUDA, SSL |
84 | Rolf Oppliger, Sebastian Gajek |
Effective Protection Against Phishing and Web Spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 32-41, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
visual spoofing, phishing, SSL/TLS, Web spoofing |
78 | Jingli Zhou, Hongtao Xia, Jifeng Yu, Xiaofeng Wang |
Asymmetrical SSL Tunnel Based VPN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, 4th International Symposium, ISPA 2006, Sorrento, Italy, December 4-6, 2006, Proceedings, pp. 113-124, 2006, Springer, 3-540-68067-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
76 | Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski |
Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings, pp. 191-202, 2006, Springer, 3-540-49462-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis |
Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings, pp. 13-24, 2004, Springer, 3-540-21959-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Network Domain Security, Mobile Networks, UMTS, PKI, IPsec, SSL/TLS |
69 | Rolf Oppliger, Ralf Hauser, David A. Basin |
SSL/TLS Session-Aware User Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 41(3), pp. 59-65, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
man-in-the-middle (MITM) attacks, SSL/TLS protocols, security, user authentication |
67 | Takamichi Saito, Kiyomi Sekiguchi, Ryosuke Hatsugai |
Authentication Binding between TLS and HTTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: Network-Based Information Systems, 2nd International Conference, NBiS 2008, Turin, Italy, September 1-5, 2008. Proceedings, pp. 252-262, 2008, Springer, 978-3-540-85692-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
67 | Vorapranee Khu-smith, Chris J. Mitchell |
Enhancing E-commerce Security Using GSM Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings, pp. 72-83, 2003, Springer, 3-540-40808-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
E-commerce transactions security, GSM security, payment protocol |
56 | Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell |
A modular correctness proof of IEEE 802.11i and TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 2-15, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
protocol composition logic, TLS, IEEE 802.11i |
56 | Pino Persiano, Ivan Visconti |
A secure and private system for subscription-based remote services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(4), pp. 472-500, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cryptographic algorithms and protocols, privacy, world-wide web, Access control, anonymity |
54 | Christina N. Michael, Xiao Su |
Incorporating a New Hash Function in OpenPGP and SSL/TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 556-561, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Wai-Kong Lee, Xian-Fu Wong, Bok-Min Goi, Raphael C.-W. Phan |
CUDA-SSL: SSL/TLS accelerated by GPU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2017, Madrid, Spain, October 23-26, 2017, pp. 1-6, 2017, IEEE, 978-1-5386-1585-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
45 | Amir Herzberg, Ahmad Jbara |
Security and identification indicators for browsers against spoofing and phishing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 8(4), pp. 16:1-16:36, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Human-computer interaction, phishing, secure usability, Web spoofing |
45 | Matthew Burnside, Angelos D. Keromytis |
The case for crypto protocol awareness inside the OS kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGARCH Comput. Archit. News ![In: SIGARCH Comput. Archit. News 33(1), pp. 58-64, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson |
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 334-343, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Wu Wen |
A Delayed Commitment Scheme to Enhance Public Key Certificate Based Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 4-16 June 2000, Gaithersburg, MD, USA, pp. 181-182, 2000, IEEE Computer Society, 0-7695-0798-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
39 | Rolf Oppliger, Ruedi Rytz, Thomas Holderegger |
Internet Banking: Client-Side Attacks and Protection Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 42(6), pp. 27-33, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, e-commerce, computers and society, Internet banking, SSL/TLS |
39 | Ezedin Barka, Emad Eldin Mohamed, Kadhim Hayawi |
End-to-end security solutions for WLAN: a performance analysis for the underlying encryption algorithms in the lightweight devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 1295-1300, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
end-to-end wireless security, AES, J2ME, RC4, SSL/TLS |
33 | Christiaan J. Lamprecht, Aad P. A. van Moorsel |
Runtime Security Adaptation Using Adaptive SSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 14th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2008, 15-17 December 2008, Taipei, Taiwan, pp. 305-312, 2008, IEEE Computer Society, 978-0-7695-3448-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Yongdong Wu, Feng Bao 0001 |
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 264-278, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Eric Freudenthal, Lawrence Port, Tracy Pesin, Edward Keenan |
Switchboard: Secure, Monitored Connections for Client-Server Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 22nd International Conference on Distributed Computing Systems, Workshops (ICDCSW '02) July 2-5, 2002, Vienna, Austria, Proceedings, pp. 660-665, 2002, IEEE Computer Society, 0-7695-1588-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Iqbal Luqman Bin Mohd Paris, Mohamed Hadi Habaebi, Alhareth Zyoud |
Implementation of SSL/TLS Security with MQTT Protocol in IoT Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 132(1), pp. 163-182, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Pengbo Nie, Chengcheng Wan, Jiayu Zhu, Ziyi Lin, Yuting Chen, Zhendong Su 0001 |
Coverage-directed Differential Testing of X.509 Certificate Validation in SSL/TLS Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 32(1), pp. 3:1-3:32, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Rui Yan, Shuai Wang, Dan Li 0001 |
Poster: Q-Scanner: A Fast Scanning Tool for Large-Scale SSL/TLS Configurations Measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2023 Conference, ACM SIGCOMM 2023, New York, NY, USA, 10-14 September 2023, pp. 1135-1137, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Keiichiro Kimura, Yoshiaki Shiraishi, Masakatu Morii |
A New Approach to Disabling SSL/TLS: Man-in-the-Middle Attacks are still Effective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
candar ![In: Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28 - Dec. 1, 2023, pp. 11-19, 2023, IEEE, 979-8-3503-0670-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Chu Chen, Pinghong Ren, Zhenhua Duan, Cong Tian, Xu Lu 0003, Bin Yu 0008 |
SBDT: Search-Based Differential Testing of Certificate Parsers in SSL/TLS Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2023, Seattle, WA, USA, July 17-21, 2023, pp. 967-979, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Yi Bian, Fangyu Zheng, Yuewu Wang, Lingguang Lei, Yuan Ma, Jiankuo Dong, Jiwu Jing |
AsyncGBP: Unleashing the Potential of Heterogeneous Computing for SSL/TLS with GPU-based Provider. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP ![In: Proceedings of the 52nd International Conference on Parallel Processing, ICPP 2023, Salt Lake City, UT, USA, August 7-10, 2023, pp. 337-346, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Fidan Bozkurt, Mustafa Kara, Muhammed Ali Aydin, Hasan Hüseyin Balik |
Exploring the Vulnerabilities and Countermeasures of SSL/TLS Protocols in Secure Data Transmission Over Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDAACS ![In: 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2023, Dortmund, Germany, September 7-9, 2023, pp. 400-407, 2023, IEEE, 979-8-3503-5805-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Shanaka Anuradha Samarakoon |
Bypassing Content-based internet packages with an SSL/TLS Tunnel, SNI Spoofing, and DNS spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.05447, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | B. Arunkumar 0001, G. Kousalya 0001 |
Secure and Light Weight Elliptic Curve Cipher Suites in SSL/TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Syst. Sci. Eng. ![In: Comput. Syst. Sci. Eng. 40(1), pp. 179-190, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Anyi Liu, Ali Alqazzaz, Ming Hua 0003, Balakrishnan Dharmalingam |
Iotverif: Automatic Verification of SSL/TLS Certificate for IoT Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 27038-27050, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Florin B. Manolache, Octavian Rusu |
Automated SSL/TLS Certificate Distribution System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RoEduNet ![In: 2021 20th RoEduNet Conference: Networking in Education and Research (RoEduNet), Iasi, Romania, November 4-6, 2021, pp. 1-6, 2021, IEEE, 978-1-6654-1351-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Jie Lu, Gaopeng Gou, Majing Su, Dong Song, Chang Liu 0049, Chen Yang, Yangyang Guan |
GAP-WF: Graph Attention Pooling Network for Fine-grained SSL/TLS Website Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: International Joint Conference on Neural Networks, IJCNN 2021, Shenzhen, China, July 18-22, 2021, pp. 1-8, 2021, IEEE, 978-1-6654-3900-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Muneer Alwazzeh, Sameer Karaman, Mohammad Nur Shamma |
Man in The Middle Attacks Against SSL/TLS: Mitigation and Defeat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cyber Secur. Mobil. ![In: J. Cyber Secur. Mobil. 9(3), pp. 449-468, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Yingjie Wang, Guangquan Xu, Xing Liu, Weixuan Mao, Chengxiang Si, Witold Pedrycz, Wei Wang 0012 |
Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 167, pp. 110609, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Lili Quan, Qianyu Guo, Hongxu Chen 0001, Xiaofei Xie, Xiaohong Li 0001, Yang Liu 0003, Jing Hu 0007 |
SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 35th IEEE/ACM International Conference on Automated Software Engineering, ASE 2020, Melbourne, Australia, September 21-25, 2020, pp. 524-535, 2020, IEEE, 978-1-4503-6768-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Tamara Radivilova, Lyudmyla Kirichenko, Dmytro Ageyev, Maxim Tawalbeh, Vitalii Bulakh |
Decrypting SSL/TLS traffic for hidden threats detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1904.08383, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
31 | Cong Tian, Chu Chen, Zhenhua Duan, Liang Zhao 0021 |
Differential Testing of Certificate Validation in SSL/TLS Implementations: An RFC-guided Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 28(4), pp. 24:1-24:37, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Ziqing Zhang, Cuicui Kang, Gang Xiong 0001, Zhen Li 0011 |
Deep Forest with LRRS Feature for Fine-grained Website Fingerprinting with Encrypted SSL/TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 28th ACM International Conference on Information and Knowledge Management, CIKM 2019, Beijing, China, November 3-7, 2019., pp. 851-860, 2019, ACM, 978-1-4503-6976-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Yingjie Wang, Xing Liu, Weixuan Mao, Wei Wang 0012 |
DCDroid: automated detection of SSL/TLS certificate verification vulnerabilities in Android apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM TUR-C ![In: Proceedings of the ACM Turing Celebration Conference - China, ACM TUR-C 2019, Chengdu, China, May 17-19, 2019., pp. 137:1-137:9, 2019, ACM, 978-1-4503-7158-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Lydia Kraus, Martin Ukrop, Vashek Matyas, Tobias Fiebig |
Evolution of SSL/TLS Indicators and Warnings in Web Browsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 267-280, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Lydia Kraus |
Evolution of SSL/TLS Indicators and Warnings in Web Browsers (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 281-288, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Yong Fang 0002, Yijia Xu, Cheng Huang 0003, Liang Liu 0009, Lei Zhang 0101 |
Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random Forest. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICT (2) ![In: Fourth International Congress on Information and Communication Technology - ICICT 2019, London, UK, February 25-26, 2019, Volume 2, pp. 99-115, 2019, Springer, 978-981-32-9342-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Chao Chen, Wenrui Diao, Yingpei Zeng, Shanqing Guo, Chengyu Hu |
DRLGENCERT: Deep Learning-based Automated Testing of Certificate Verification in SSL/TLS Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1808.05444, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
31 | Khalid Alghamdi, Ali Alqazzaz, Anyi Liu, Ming Hua 0003 |
IoTVerif: An Automated Tool to Verify SSL/TLS Certificate Validation in Android MQTT Client Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 95-102, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Vitor A. Cunha, Márcio Barbosa de Carvalho, Daniel Corujo, João Paulo Barraca, Diogo Gomes 0001, Alberto E. Schaeffer Filho, Carlos Raniery Paula dos Santos, Lisandro Zambenedetti Granville, Rui L. Aguiar |
An SFC-enabled approach for processing SSL/TLS encrypted traffic in Future Enterprise Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: 2018 IEEE Symposium on Computers and Communications, ISCC 2018, Natal, Brazil, June 25-28, 2018, pp. 1013-1019, 2018, IEEE, 978-1-5386-6950-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Peipei Fu, Zhen Li 0011, Gang Xiong 0001, Zigang Cao, Cuicui Kang |
SSL/TLS Security Exploration Through X.509 Certificate's Life Cycle Measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: 2018 IEEE Symposium on Computers and Communications, ISCC 2018, Natal, Brazil, June 25-28, 2018, pp. 652-655, 2018, IEEE, 978-1-5386-6950-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Mohannad Alhanahnah, Qiben Yan |
Towards best secure coding practice for implementing SSL/TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM Workshops ![In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2018, Honolulu, HI, USA, April 15-19, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-5979-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Yuji Suga |
Status Survey of SSL/TLS Sites in 2018 After Pointing Out About "Search form" Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANDAR Workshops ![In: Sixth International Symposium on Computing and Networking, CANDAR Workshops 2018, Takayama, Japan, November 27-30, 2018, pp. 483-485, 2018, IEEE Computer Society, 978-1-5386-9184-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Eduardo Sousa, Vitor A. Cunha, Marcio Barbosa de Carvalho, Daniel Corujo, João Paulo Barraca, Diogo Gomes 0001, Alberto E. Schaeffer Filho, Carlos Raniery Paula dos Santos, Lisandro Zambenedetti Granville, Rui L. Aguiar |
Orchestrating an SFC-enabled SSL/TLS traffic processing architecture using MANO. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NFV-SDN ![In: IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2018, Verona, Italy, November 27-29, 2018, pp. 1-7, 2018, IEEE, 978-1-5386-8281-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Anthony Cardillo, Aleksander Essex |
The Threat of SSL/TLS Stripping to Online Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
E-Vote-ID ![In: Electronic Voting - Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings, pp. 35-50, 2018, Springer, 978-3-030-00418-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Chu Chen, Cong Tian, Zhenhua Duan, Liang Zhao 0021 |
RFC-directed differential testing of certificate validation in SSL/TLS implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: Proceedings of the 40th International Conference on Software Engineering, ICSE 2018, Gothenburg, Sweden, May 27 - June 03, 2018, pp. 859-870, 2018, ACM, 978-1-4503-5638-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Chao Chen, Wenrui Diao, Yingpei Zeng, Shanqing Guo, Chengyu Hu |
DRLgencert: Deep Learning-Based Automated Testing of Certificate Verification in SSL/TLS Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSME ![In: 2018 IEEE International Conference on Software Maintenance and Evolution, ICSME 2018, Madrid, Spain, September 23-29, 2018, pp. 48-58, 2018, IEEE Computer Society, 978-1-5386-7870-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Yuan Xiao 0001, Mengyuan Li, Sanchuan Chen, Yinqian Zhang |
Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1707.03473, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
31 | Christian Javier D'Orazio, Kim-Kwang Raymond Choo |
A technique to circumvent SSL/TLS validations on iOS devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 74, pp. 366-374, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Yuan Xiao 0001, Mengyuan Li, Sanchuan Chen, Yinqian Zhang |
STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, pp. 859-874, 2017, ACM, 978-1-4503-4946-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Dawei Wang 0005, Qingin He, Liping Qian, Yibo Xue, Yingfei Dong |
Understanding IP address multiplexing with large-scale SSL/TLS flow analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC ![In: 2017 International Conference on Computing, Networking and Communications, ICNC 2017, Silicon Valley, CA, USA, January 26-29, 2017, pp. 541-545, 2017, IEEE Computer Society, 978-1-5090-4588-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Josip Bozic, Kristoffer Kleine, Dimitris E. Simos, Franz Wotawa |
Planning-Based Security Testing of the SSL/TLS Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICST Workshops ![In: 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICST Workshops 2017, Tokyo, Japan, March 13-17, 2017, pp. 347-355, 2017, IEEE Computer Society, 978-1-5090-6676-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Laurie Perrin, Andre Brisson |
Enhancing transport layer security with Dynamic Identity Verification and Authentication (DIVA): Maintaining and enhancing SSL/TLS reliability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI ![In: 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017, San Francisco, CA, USA, August 4-8, 2017, pp. 1-5, 2017, IEEE, 978-1-5386-0435-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, Suman Jana |
HVLearn: Automated Black-Box Analysis of Hostname Verification in SSL/TLS Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017, pp. 521-538, 2017, IEEE Computer Society, 978-1-5090-5533-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Mónica Patricia Pineda Vargas, Rafael Antonio Acosta Rodriguez, Octavio José Salcedo Parra |
Algorithm for the Optimization of RSA Based on Parallelization over GPU SSL/TLS Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartCloud ![In: 2017 IEEE International Conference on Smart Cloud, SmartCloud 2017, New York City, NY, USA, November 3-5, 2017, pp. 294-297, 2017, IEEE Computer Society, 978-1-5386-3684-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Ali Alkazimi |
Misuse Patterns for the SSL/TLS Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2017 |
RDF |
|
31 | Rourab Paul, Amlan Chakrabarti, Ranjan Ghosh |
Multi core SSL/TLS security processor architecture and its FPGA prototype design with automated preferential algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microsystems ![In: Microprocess. Microsystems 40, pp. 124-136, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Martin Husák, Milan Cermák, Tomás Jirsík, Pavel Celeda |
HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Inf. Secur. ![In: EURASIP J. Inf. Secur. 2016, pp. 6, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Prakhar Jain, K. K. Shukla 0001 |
Cryptographic Assessment of SSL/TLS Servers Popular in India. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSCC ![In: Security in Computing and Communications - 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings, pp. 112-123, 2016, Springer, 978-981-10-2737-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Alireza Ranjbar, Miika Komu, Patrik Salmela, Tuomas Aura |
An SDN-based approach to enhance the end-to-end security: SSL/TLS case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: 2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016, Istanbul, Turkey, April 25-29, 2016, pp. 281-288, 2016, IEEE, 978-1-5090-0223-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Suhairi Mohd Jawi, Fakariah Hani Mohd Ali |
Rules and Results for SSL/TLS Nonintrusive Proxy Based on JSON Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITCS ![In: 6th International Conference on IT Convergence and Security, ICITCS 2016, Prague, Czech Republic, September 26, 2016, pp. 1-5, 2016, IEEE Computer Society, 978-1-5090-3765-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Yu Guo, Zigang Cao, Weiyong Yang, Gang Xiong 0001 |
A Measurement and Security Analysis of SSL/TLS Deployment in Mobile Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ChinaCom (1) ![In: Communications and Networking - 11th EAI International Conference, ChinaCom 2016, Chongqing, China, September 24-26, 2016, Proceedings, Part I, pp. 189-199, 2016, Springer, 978-3-319-66624-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Sanghak Oh, Eunsoo Kim, Hyoungshick Kim |
Empirical Analysis of SSL/TLS Weaknesses in Real Websites: Who Cares? ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers, pp. 174-185, 2016, 978-3-319-56548-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Maryam Asadzadeh Kaljahi, Ali Payandeh, Mohammad Bagher Ghaznavi Ghoushchi |
TSSL: improving SSL/TLS protocol by trust model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 8(9), pp. 1659-1671, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Ming Zhang 0021, Boyi Xu, Yanlai Guo |
针对SSL/TLS的典型攻击 (Review of Typical Attacks on SSL/TLS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 42(Z6), pp. 408-412, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
31 | Martin Husák, Milan Cermák, Tomás Jirsík, Pavel Celeda |
Network-Based HTTPS Client Identification Using SSL/TLS Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: 10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, August 24-27, 2015, pp. 389-396, 2015, IEEE Computer Society, 978-1-4673-6590-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Yuting Chen, Zhendong Su 0001 |
Guided differential testing of certificate validation in SSL/TLS implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2015, Bergamo, Italy, August 30 - September 4, 2015, pp. 793-804, 2015, ACM, 978-1-4503-3675-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Sung-Min Kim, Young-Hoon Goo, Myung-Sup Kim, Soo-Gil Choi, Mi-Jung Choi |
A method for service identification of SSL/TLS encrypted traffic with the relation of session ID and Server IP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: 17th Asia-Pacific Network Operations and Management Symposium, APNOMS 2015, Busan, South Korea, August 19-21, 2015, pp. 487-490, 2015, IEEE, 978-4-8855-2296-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Mikhail Zolotukhin, Timo Hämäläinen 0002, Tero Kokkonen, Antti Niemelä, Jarmo Siltanen |
Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NEW2AN ![In: Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 15th International Conference, NEW2AN 2015, and 8th Conference, ruSMART 2015, St. Petersburg, Russia, August 26-28, 2015, Proceedings, pp. 274-285, 2015, Springer, 978-3-319-23125-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Pernelle Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, Youki Kadobayashi |
AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BADGERS@RAID ![In: 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@RAID 2015, Kyoto, Japan, November 5, 2015, pp. 74-84, 2015, IEEE, 978-1-4673-8944-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Jing Wang, Ying Yang, Lijuan Chen, Guang Yang, Zhenya Chen, Liqiang Wen |
A Combination of Timing Attack and Statistical Method to Reduce Computational Complexities of SSL/TLS Side-Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 402-406, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Rourab Paul, Amlan Chakrabarti, Ranjan Ghosh |
Multi Core SSL/TLS Security Processor Architecture Prototype Design with automated Preferential Algorithm in FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1410.7560, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
31 | Yuji Suga |
SSL/TLS Servers Status Survey about Enabling Forward Secrecy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: 17th International Conference on Network-Based Information Systems, NBiS 2014, Salerno, Italy, September 10-12, 2014, pp. 501-505, 2014, IEEE Computer Society, 978-1-4799-4224-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jörg Schwenk, Sebastian Schinzel, Erik Tews |
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., pp. 733-748, 2014, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
31 | David Sounthiraraj, Justin Sahs, Garret Greenwood, Zhiqiang Lin, Latifur Khan |
SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014, 2014, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
31 | Yun-An Chang, Ming-Shing Chen, Jong-Shian Wu, Bo-Yin Yang |
Postquantum SSL/TLS for Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOCA ![In: 7th IEEE International Conference on Service-Oriented Computing and Applications, SOCA 2014, Matsue, Japan, November 17-19, 2014, pp. 266-270, 2014, IEEE Computer Society, 978-1-4799-6833-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Chad Brubaker, Suman Jana, Baishakhi Ray, Sarfraz Khurshid, Vitaly Shmatikov |
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, pp. 114-129, 2014, IEEE Computer Society, 978-1-4799-4686-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Kevin Benton, Ty Bross |
Timing Analysis of SSL/TLS Man in the Middle Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1308.3559, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
31 | Christopher Meyer, Jörg Schwenk |
Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 49, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|