共 39 条
[2]
[Anonymous], 2015, PROC ONLINE INT C GR
[3]
Barabosch T, 2014, PROCEEDINGS OF THE 2014 9TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE: THE AMERICAS (MALWARE), P8, DOI 10.1109/MALWARE.2014.6999410
[4]
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS
[J].
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014),
2014,
:98-113
[6]
Choi H, 2015, INT CONF UBIQ FUTUR, P476, DOI 10.1109/ICUFN.2015.7182589
[7]
Cooijmans Tim., 2014, Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones Mobile Devices, P11, DOI DOI 10.1145/2666620.2666627
[8]
Coppolino L, 2016, P IEEE 18 INT C COMP, P145
[9]
Fernandes E, 2017, ARXIV170700405CSCR
[10]
Gong L., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P234, DOI 10.1109/RISP.1990.63854