共 23 条
[1]
[Anonymous], 2013, IACR CRYPTOL EPRINT
[2]
[Anonymous], 1999, RFC2616: Hypertext Transfer Protocol
[3]
[Anonymous], 1546 RFC INT ENG TAS
[4]
Backes M, 2014, LECT NOTES COMPUT SC, V8479, P401, DOI 10.1007/978-3-319-07536-5_24
[5]
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS
[J].
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014),
2014,
:98-113
[6]
Implementing TLS with Verified Cryptographic Security
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:445-459
[7]
Bleichenbacher D, 1998, LECT NOTES COMPUT SC, V1462, P1, DOI 10.1007/BFb0055716
[8]
Card S. K., 1991, Human Factors in Computing Systems. Reaching Through Technology. CHI '91. Conference Proceedings, P181, DOI 10.1145/108844.108874
[9]
CloudFlare Inc, 2014, CLOUDFLARE KEYL SSL
[10]
Delignat-Lavaud A., 2014, BLACK HAT 2014