![]() |
Volumn 8, Issue 6, 2010, Pages 80-84
|
Splitting the HTTPS stream to attack secure web connections
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTATIONAL LOADS;
DATA STREAM;
ENCRYPTION/DECRYPTION;
KEY EXCHANGE;
MAN IN THE MIDDLE ATTACKS;
USER DATA;
CRYPTOGRAPHY;
INTERNET PROTOCOLS;
NETWORK SECURITY;
HTTP;
|
EID: 78650070096
PISSN: 15407993
EISSN: None
Source Type: Journal
DOI: 10.1109/MSP.2010.190 Document Type: Article |
Times cited : (13)
|
References (3)
|