Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference55 articles.
1. Krawczyk H, Paterson KG, Wee H (2013) On the security of the TLS protocol: a systematic analysis. In: Advances in Cryptology—CRYPTO 2013. Springer, Berlin, pp 429–448
2. Jager T, Kohlar F, Schäge S, Schwenk J (2017) Authenticated confidential channel establishment and the security of TLS-DHE. J Cryptol 20:1–49
3. Paulson LC (1999) Inductive analysis of the Internet protocol TLS. ACM Trans Inf Syst Secur (TISSEC) 2(3):332–351
4. Santos-González I, Rivero-García A, Molina-Gil J, Caballero-Gil P (2017) Implementation and analysis of real-time streaming protocols. Sensors 17(4):846
5. Schulzrinne H, Rosenberg J (2000) The session initiation protocol: internet-centric signaling. IEEE Commun Mag 38(10):134–141
Cited by
79 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献