메뉴 건너뛰기




Volumn 7, Issue 4, 2004, Pages 553-575

Client-side caching for TLS

Author keywords

Bloom filters; Session cache; TLS; Wireless networks

Indexed keywords

BLOOM FILTERS; PAYLOAD TRANSFERS; SECURITY; SESSION CACHE; TLS;

EID: 14544299579     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/1042031.1042034     Document Type: Article
Times cited : (21)

References (28)
  • 2
    • 0032669778 scopus 로고    scopus 로고
    • Transport layer security: How much does it really cost?
    • A. K. Choudhury and N. Shroff, Eds. IEEE
    • APOSTOLOPOULOS, G., PERIS, V., AND SAHA, D. 1999. Transport layer security: How much does it really cost? In Proceedings of IEEE Infocom '99, A. K. Choudhury and N. Shroff, Eds. IEEE, 717-725.
    • (1999) Proceedings of IEEE Infocom '99 , pp. 717-725
    • Apostolopoulos, G.1    Peris, V.2    Saha, D.3
  • 3
    • 0034228518 scopus 로고    scopus 로고
    • Securing electronic commerce: Reducing the SSL overhead
    • July
    • APOSTOLOPOULOS, G., PERIS, V., PRADHAN, P., AND SAHA, D. 2000. Securing electronic commerce: Reducing the SSL overhead. IEEE Netw. 14, 4 (July), 8-16.
    • (2000) IEEE Netw. , vol.14 , Issue.4 , pp. 8-16
    • Apostolopoulos, G.1    Peris, V.2    Pradhan, P.3    Saha, D.4
  • 5
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on RSA encryption standard pkcs #1
    • H. Krawczyk, Ed. Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • BLEICHENBACHER, D. 1998. Chosen ciphertext attacks against protocols based on RSA encryption standard pkcs #1. In Proceedings of Crypto 1998, H. Krawczyk, Ed. Lecture Notes in Computer Science, vol. 1462. Springer-Verlag, Berlin, 1-12.
    • (1998) Proceedings of Crypto 1998 , vol.1462 , pp. 1-12
    • Bleichenbacher, D.1
  • 6
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • BLOOM, B. 1970. Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 7, 422-6.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 7
    • 14544279406 scopus 로고
    • Analysis of the SSL protocol
    • Department of Computer Science, University of Bristol
    • BRADLEY, J. AND DAVIES, N. 1995. Analysis of the SSL protocol. Tech. Rep. CSTR-95-021, Department of Computer Science, University of Bristol.
    • (1995) Tech. Rep. , vol.CSTR-95-021
    • Bradley, J.1    Davies, N.2
  • 9
    • 35248836120 scopus 로고    scopus 로고
    • Password interception in a SSL/TLS channel
    • D. Boneh, Ed. Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • CANVEL, B., HILTGEN, A., VAUDENAY, S., AND VUAGNOUX, M. 2003. Password interception in a SSL/TLS channel. In Proceedings of Crypto 2003, D. Boneh, Ed. Lecture Notes in Computer Science, vol. 2729. Springer-Verlag, Berlin, 583-599.
    • (2003) Proceedings of Crypto 2003 , vol.2729 , pp. 583-599
    • Canvel, B.1    Hiltgen, A.2    Vaudenay, S.3    Vuagnoux, M.4
  • 10
    • 85094920316 scopus 로고    scopus 로고
    • Performance analysis of TLS web servers
    • M. Tripunitara, Ed. Internet Society
    • COARFA, C., DRUSCHEL, P., AND WALLACH, D. 2002. Performance analysis of TLS web servers. In Proceedings of NDSS 2002, M. Tripunitara, Ed. Internet Society, 183-194.
    • (2002) Proceedings of NDSS 2002 , pp. 183-194
    • Coarfa, C.1    Druschel, P.2    Wallach, D.3
  • 12
    • 0018443381 scopus 로고
    • Privacy and authentication: An introduction to cryptography
    • DIFFIE, W. AND HELLMAN, M. 1979. Privacy and authentication: An introduction to cryptography. Proc. IEEE 67, 397-427.
    • (1979) Proc. IEEE , vol.67 , pp. 397-427
    • Diffie, W.1    Hellman, M.2
  • 13
    • 33646755342 scopus 로고    scopus 로고
    • Secure web server performance dramatically improved by caching SSL session keys
    • P. Cao and S. Sarukkai, Eds.
    • GOLDBERG, A., BUFF, R., AND SCHMITT, A. 1998. Secure web server performance dramatically improved by caching SSL session keys. In Proceedings of WISP 1998, P. Cao and S. Sarukkai, Eds.
    • (1998) Proceedings of WISP 1998
    • Goldberg, A.1    Buff, R.2    Schmitt, A.3
  • 14
    • 85180529073 scopus 로고    scopus 로고
    • Speeding up secure web transactions using elliptic curve cryptography
    • M. Tripunitara, Ed. Internet Society
    • GUPTA, V., STEBILA, D., FUNG, S., SHANTZ, S.C., GURA, N., AND EBERLE, H. 2004. Speeding up secure web transactions using elliptic curve cryptography. In Proceedings of NDSS '04, M. Tripunitara, Ed. Internet Society.
    • (2004) Proceedings of NDSS '04
    • Gupta, V.1    Stebila, D.2    Fung, S.3    Shantz, S.C.4    Gura, N.5    Eberle, H.6
  • 15
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • N. Koblitz, Ed. Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • KOCHER, P. 1996. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Proceedings of Crypto 1996, N. Koblitz, Ed. Lecture Notes in Computer Science, vol. 1109. Springer-Verlag, Berlin, 104-113.
    • (1996) Proceedings of Crypto 1996 , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 16
    • 84880901653 scopus 로고    scopus 로고
    • The order of encryption and authentication for protecting communications
    • J. Killian, Ed. Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • KRAWCZYK, H. 2001. The order of encryption and authentication for protecting communications. In Proceedings of Crypto 2001, J. Killian, Ed. Lecture Notes in Computer Science, vol. 2139. Springer-Verlag, Berlin, 310-31.
    • (2001) Proceedings of Crypto 2001 , vol.2139 , pp. 310-331
    • Krawczyk, H.1
  • 19
    • 85024252307 scopus 로고    scopus 로고
    • Inductive analysis of the internet protocol TLS
    • PAULSON, L. C. 1999. Inductive analysis of the internet protocol TLS. ACM Trans. Informat. Syst. Secur. 2, 3, 332-51.
    • (1999) ACM Trans. Informat. Syst. Secur. , vol.2 , Issue.3 , pp. 332-351
    • Paulson, L.C.1
  • 22
    • 14544274210 scopus 로고    scopus 로고
    • Internet Draft: draft-shacham-tls-fasttrack-00.txt. Work in progress
    • SHACHAM, H. AND BONEH, D. 2001. TLS Fast-Track Session Establishment. Internet Draft: draft-shacham-tls-fasttrack-00.txt. Work in progress.
    • (2001) TLS Fast-track Session Establishment
    • Shacham, H.1    Boneh, D.2
  • 25
    • 84947212539 scopus 로고    scopus 로고
    • Security flaws induced by CBC padding - Applications to SSL, IPSEC, WTLS
    • L. Knudsen, Ed. Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • VAUDENAY, S. 2002. Security flaws induced by CBC padding - applications to SSL, IPSEC, WTLS . . . In Proceedings of Eurocrypt 2002, L. Knudsen, Ed. Lecture Notes in Computer Science, vol. 2332. Springer-Verlag, Berlin, 534-545.
    • (2002) Proceedings of Eurocrypt 2002 , vol.2332 , pp. 534-545
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.