Login / Signup
Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3.
Xiao Lan
Jing Xu
Zhen-Feng Zhang
Wen-Tao Zhu
Published in:
IEEE Trans. Dependable Secur. Comput. (2019)
Keyphrases
</>
intrusion detection
information security
access control
statistical databases
factor authentication
database
risk assessment
security requirements
security systems
security threats
data sets
electronic commerce
wireless networks
security policies
functional requirements
security measures