Author:
Bhargavan Karthikeyan,Fournet Cedric,Kohlweiss Markulf
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Subject
Law,Electrical and Electronic Engineering,Computer Networks and Communications
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. ProInspector: Uncovering Logical Bugs in Protocol Implementations;2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P);2024-07-08
2. ARMOR: A Formally Verified Implementation of X.509 Certificate Chain Validation;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
3. Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
4. Exploring the Vulnerabilities and Countermeasures of SSL/TLS Protocols in Secure Data Transmission Over Computer Networks;2023 IEEE 12th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS);2023-09-07
5. A Verified Implementation of the DPLL Algorithm in Dafny;Mathematics;2022-06-28