Author:
Huang J.K.,Zhang Z.X.,Li W.J.,Xin Y.
Reference41 articles.
1. Adrian D, Bhargavan K, Durumeric Z, et al. Imperfect forward secrecy: How Diffie-Hellman fails in practice[C]//Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 2015: 5-17.
2. Lucky thirteen: Breaking the TLS and DTLS record protocols[C];Al Fardan,2013
3. Alexa Top 1,000,000 Sites. http://s3.amazonaws.com/alexa-static/top-1m.csv.zip.
4. APNIC: ftp://ftp.apnic.net/pub/apnic/stats.
5. A messy state of the union: Taming the composite state machines of TLS[C];Beurdouche,2015
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献