Author:
Zhao Sendong,Wang Ding,Zhao Sicheng,Yang Wu,Ma Chunguang
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Callegati, F., Cerroni, W., Ramilli, M.: Man-in-the-middle attack to the https protocol. IEEE Security Privacy 7(1), 78–81 (2009)
2. Lecture Notes in Computer Science;N. Nikiforakis,2010
3. Shin, D., Lopes, R.: An empirical study of visual security cues to prevent the sslstripping attack. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 287–296. ACM, New York (2011)
4. Fung, A.P.H., Cheung, K.W.: Sslock: sustaining the trust on entities brought by ssl. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, pp. 204–213. ACM, New York (2010)
5. Liu, A., Kovacs, J., Gouda, M.: A secure cookie scheme. Computer Networks 56(6), 1723–1730 (2012)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献