Login / Signup

Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates.

Alexey G. BusyginArtem S. KonoplevMaxim O. Kalinin
Published in: Autom. Control. Comput. Sci. (2016)
Keyphrases
  • security protocols
  • countermeasures
  • smart card
  • cryptographic protocols
  • denial of service attacks
  • watermarking scheme
  • computer security
  • security analysis