Author:
Hong Young Ran,Kim Dongsoo
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Industrial and Manufacturing Engineering,Software
Reference21 articles.
1. Adelsbach, A., Gajek, S., & Schwenk, J. (2005). Visual spoofing of SSL protected web sites and effective countermeasures. In Proceedings of ISPEC2005 (Vol. 3439, pp. 204–217), LNCS.
2. Andreeva E., Mennink B., Preneel B. (2010) Security properties of domain extenders for cryptographic hash functions. Journal of Information Processing Systems 6(4): 453–480
3. Callegati F. (2009) Man-in-the-middle attack to the HTTPs protocol. Security & Privacy 7(1): 78–81
4. Cheng B., Chen H., Tseng R. (2010) Quality assurance evidence collection model for MSN forensics. Journal of Intelligent Manufacturing 21(5): 613–622
5. Dierks, T., & Rescorla, E. (2006). The TLS protocol Version 1.1, RFC4346. http://wiki.ietf.org/html/rfc4346 . Accessed on May 15, 2012.