Author:
Debnath Joyanta,Chau Sze Yiu,Chowdhury Omar
Publisher
Springer International Publishing
Reference41 articles.
1. Baseline requirements for the issuance and management of publicly-trusted certificates (2019). https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.6.6.pdf
2. Al Fardan, N.J., Paterson, K.G.: Lucky thirteen: breaking the TLS and DTLS record protocols. In: IEEE S&P (2013)
3. AlFardan, N., Bernstein, D.J., Paterson, K.G., Poettering, B., Schuldt, J.C.: On the security of RC4 in TLS. In: USENIX Security (2013)
4. Barker, E., Mouha, N.: Recommendation for triple data encryption algorithm (TDEA) block cipher. NIST special publication 800–67 Rev. 2 (2017)
5. Barker, E., Roginsk, A.: Transitioning the use of cryptographic algorithms and key lengths. NIST special publication 800–131A Rev. 2 (2019)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. ARMOR: A Formally Verified Implementation of X.509 Certificate Chain Validation;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
2. You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks;2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2022-12
3. All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations;Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security;2021-11-12
4. When TLS Meets Proxy on Mobile;Applied Cryptography and Network Security;2020