On the security of TLS renegotiation.
Florian GiesenFlorian KohlarDouglas StebilaPublished in: CCS (2013)
Keyphrases
- access control
- intrusion detection
- information security
- security systems
- security requirements
- high security
- security policies
- statistical databases
- security issues
- data security
- information assurance
- security problems
- security level
- key management
- network security
- risk analysis
- security mechanisms
- countermeasures
- cyber attacks
- risk assessment
- security threats
- neural network
- real time