Author:
Alashwali Eman Salem,Rasmussen Kasper
Publisher
Springer International Publishing
Reference34 articles.
1. CVE-2015-3197 (2015).
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197
2. Adrian, D., et al.: Imperfect forward secrecy: how Diffie-Hellman fails in practice. In: Proceedings of Conference on Computer and Communications Security (CCS), pp. 5–17 (2015)
3. Aviram, N., et al.: DROWN: breaking TLS using SSLv2. In: Proceedings of USENIX Security Symposium, pp. 689–706 (2016)
4. Beurdouche, B., et al.: A Messy state of the union: taming the composite state machines of TLS. In: Proceedings of IEEE Symposium on Security and Privacy (SP), pp. 535–552 (2015)
5. Bhargavan, K., Brzuska, C., Fournet, C., Green, M., Kohlweiss, M., Zanella-Béguelin, S.: Downgrade resilience in key-exchange protocols. In: Proceedings of IEEE Symposium on Security and Privacy (SP), pp. 506–525 (2016)
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献