On the Security of TLS Renegotiation.
Florian GiesenFlorian KohlarDouglas StebilaPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- access control
- information security
- security requirements
- network security
- security policies
- security systems
- intrusion detection
- statistical databases
- security issues
- security management
- genetic algorithm
- parameter estimation
- risk analysis
- computer security
- data security
- database systems
- cyber attacks
- security problems
- security threats
- website