-
5
-
-
34447131375
-
-
Apr
-
S. Blake-Wilson, M. Nystrom, D. Hopwood, J. Mikkelsen, and T. Wright. Transport layer security (tls) extensions. http://tools.ietf.org/html/rfc4366, Apr 2006.
-
(2006)
Transport Layer Security (Tls) Extensions
-
-
Blake-Wilson, S.1
Nystrom, M.2
Hopwood, D.3
Mikkelsen, J.4
Wright, T.5
-
7
-
-
84902014963
-
-
E. Butler. Firesheep. http://codebutler.com/firesheep, 2010.
-
(2010)
Firesheep
-
-
Butler, E.1
-
9
-
-
0004035649
-
-
Internet Engineering Task Force, Jan. RFC-2246
-
T. Dierks and C. Allen. The TLS Protocol, Version 1.0. Internet Engineering Task Force, Jan. 1999. RFC-2246, ftp://ftp.isi.edu/in-notes/rfc2246.txt.
-
(1999)
The TLS Protocol, Version 1.0
-
-
Dierks, T.1
Allen, C.2
-
12
-
-
85076214841
-
-
Sept
-
J. Hurwich. Chrome benchmarking extension. http://www.chromium.org/developers/designdocuments/extensions/how-the-extension-systemworks/chrome-benchmarking-extension, Sept 2010.
-
(2010)
Chrome Benchmarking Extension
-
-
Hurwich, J.1
-
13
-
-
34547484089
-
-
Microsoft. Introducing windows cardspace, 2006. http://msdn.microsoft.com/en-us/library/aa480189.aspx.
-
(2006)
Introducing Windows Cardspace
-
-
-
14
-
-
85076228784
-
-
Mozilla. BrowserID, 2012. https://developer.mozilla.org/en/BrowserID.
-
(2012)
BrowserID
-
-
-
15
-
-
79960260996
-
Hardened stateless session cookies
-
S. Murdoch. Hardened stateless session cookies. Security Protocols XVI, pages 93–101, 2011.
-
(2011)
Security Protocols
, vol.16
, pp. 93-101
-
-
Murdoch, S.1
-
17
-
-
33745913964
-
SSL/TLS session-aware user authentication–or how to effectively thwart the man-in-the-middle
-
R. Oppliger, R. Hauser, and D. Basin. SSL/TLS session-aware user authentication–or how to effectively thwart the man-in-the-middle. Computer Communications, 29(12):2338–2246, 2006.
-
(2006)
Computer Communications
, vol.29
, Issue.12
, pp. 2338-12246
-
-
Oppliger, R.1
Hauser, R.2
Basin, D.3
-
18
-
-
49849096978
-
SSL/TLS session-aware user authentication revisited
-
R. Opplinger, R. Hauser, and D. Basin. SSL/TLS session-aware user authentication revisited. Computers & Security, 27(3-4):64–70, 2008.
-
(2008)
Computers & Security
, vol.27
, Issue.3-4
, pp. 64-70
-
-
Opplinger, R.1
Hauser, R.2
Basin, D.3
-
19
-
-
0032377671
-
Verification of cache coherence protocols by aggregation of distributed transactions
-
S. Park and D. L. Dill. Verification of cache coherence protocols by aggregation of distributed transactions. Theory of Computing Systems, 31(4):355–376, 1998.
-
(1998)
Theory of Computing Systems
, vol.31
, Issue.4
, pp. 355-376
-
-
Park, S.1
Dill, D.L.2
-
22
-
-
85019736185
-
-
Sept
-
J. Rizzo and T. Duong. Beast. http://vnhacker.blogspot.com/2011/09/beast.html, Sept 2011.
-
(2011)
Beast
-
-
Rizzo, J.1
Duong, T.2
-
25
-
-
0022561959
-
Using sparse capabilities in a distributed operating system
-
Cambridge, Massachusetts, May
-
A. S. Tanenbaum, S. J. Mullender, and R. van Renesse. Using sparse capabilities in a distributed operating system. In 6th International Conference on Distributed Computing Systems, pages 558–563, Cambridge, Massachusetts, May 1986.
-
(1986)
6th International Conference on Distributed Computing Systems
, pp. 558-563
-
-
Tanenbaum, A.S.1
Mullender, S.J.2
Van Renesse, R.3
-
26
-
-
85076205986
-
-
The Chromium Project. SPDY, 2012. http://www.chromium.org/spdy.
-
(2012)
SPDY
-
-
-
27
-
-
0028380781
-
Authentication in the Taos operating system
-
E. Wobber, M. Abadi, M. Burrows, and B. Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems (TOCS), 12(1):3–32, 1994.
-
(1994)
ACM Transactions on Computer Systems (TOCS)
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
|