Login / Signup
What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS.
Eman Salem Alashwali
Kasper Rasmussen
Published in:
CoRR (2018)
Keyphrases
</>
cryptographic protocols
security protocols
lightweight
network protocols
wireless sensor networks
sensor networks
parameter estimation
authentication protocol
communication protocols
protocol specification