Sign in

Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate Validation.

Yajun TengWei WangJun ShaoHuiqing WanHeqing HuangYong LiuJingqiang Lin
Published in: ESORICS (2) (2023)
Keyphrases
  • information security
  • data mining
  • security issues
  • database
  • real time
  • countermeasures
  • security vulnerabilities
  • buffer overflow
  • public key encryption