Login / Signup
Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates.
Alexey G. Busygin
Artem S. Konoplev
Maxim O. Kalinin
Published in:
Autom. Control. Comput. Sci. (2016)
Keyphrases
</>
security protocols
countermeasures
smart card
cryptographic protocols
denial of service attacks
watermarking scheme
computer security
security analysis