On the Security of RC4 in TLS.
Nadhem J. AlFardanDaniel J. BernsteinKenneth G. PatersonBertram PoetteringJacob C. N. SchuldtPublished in: USENIX Security Symposium (2013)
Keyphrases
- network security
- security issues
- information security
- intrusion detection
- security management
- access control
- security policies
- security requirements
- security threats
- information assurance
- security systems
- data security
- security protocols
- computer security
- key management
- security mechanisms
- functional requirements
- parameter estimation
- statistical databases
- security problems
- model selection
- information systems
- real time