메뉴 건너뛰기




Volumn 8, Issue 6, 2010, Pages 80-84

Splitting the HTTPS stream to attack secure web connections

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL LOADS; DATA STREAM; ENCRYPTION/DECRYPTION; KEY EXCHANGE; MAN IN THE MIDDLE ATTACKS; USER DATA;

EID: 78650070096     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2010.190     Document Type: Article
Times cited : (13)

References (3)
  • 1
    • 2942597551 scopus 로고    scopus 로고
    • IETF RFC 2818, May
    • E. Rescorla, "HTTP Over TLS, " IETF RFC 2818, May 2000; http://datatracker.ietf.org/doc/rfc2818/.
    • (2000) HTTP Over TLS
    • Rescorla, E.1
  • 2
    • 60049085299 scopus 로고    scopus 로고
    • Man-in-the-middle attack to the HTTPS protocol
    • F. Callegati, W. Cerroni, and M. Ramilli, "Man-in-the-Middle Attack to the HTTPS Protocol, " IEEE Security & Privacy, vol. 7, no. 1, 2009, pp. 78-81.
    • (2009) IEEE Security & Privacy , vol.7 , Issue.1 , pp. 78-81
    • Callegati, F.1    Cerroni, W.2    Ramilli, M.3
  • 3
    • 33846283646 scopus 로고    scopus 로고
    • Hardening web browsers against man-in-the-middle and eavesdropping attacks
    • ACM Press
    • H. Xia and J. C. Brustoloni, "Hardening Web Browsers against Man-in-the-Middle and Eavesdropping Attacks, " Proc. 14th Intl Conf. World Wide Web, ACM Press, 2005, pp. 489-498.
    • (2005) Proc. 14th Intl Conf. World Wide Web , pp. 489-498
    • Xia, H.1    Brustoloni, J.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.