Login / Signup
miTLS: Verifying Protocol Implementations against Real-World Attacks.
Karthikeyan Bhargavan
Cédric Fournet
Markulf Kohlweiss
Published in:
IEEE Secur. Priv. (2016)
Keyphrases
</>
real world
cryptographic protocols
security protocols
denial of service attacks
data sets
data mining
secure routing
wide range
case study
synthetic data
lightweight
malicious attacks
model checking
countermeasures
database systems
cryptographic algorithms
security threats
traffic analysis
malicious users