Login / Signup
Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption.
Stanislav Spacek
Daniel Tovarnák
Pavel Celeda
Published in:
SEC (2021)
Keyphrases
</>
cryptographic protocols
security properties
long term
real world
security analysis
security protocols
virtual private network
contractual obligations
load balancing
event detection
event sequences
elliptic curve
communication protocol
key exchange
elliptic curve cryptography