메뉴 건너뛰기




Volumn 2015-July, Issue , 2015, Pages 214-231

How secure and quick is QUIC? Provable security and performance analyses

Author keywords

[No Author keywords available]

Indexed keywords

ECONOMIC AND SOCIAL EFFECTS;

EID: 84945194545     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2015.21     Document Type: Conference Paper
Times cited : (100)

References (35)
  • 6
    • 84945230076 scopus 로고    scopus 로고
    • Experimenting with QUIC
    • J. Roskind, "Experimenting with QUIC," The Chromium Blog, 2013. [Online]. Available: http://blog.chromium.org/2013/06/experimenting-with-quic.html
    • (2013) The Chromium Blog
    • Roskind, J.1
  • 8
    • 84865461888 scopus 로고    scopus 로고
    • On the security of TLS-DHE in the standard model
    • R. Safavi-Naini and R. Canetti, Eds. Springer
    • T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, "On the security of TLS-DHE in the standard model," in CRYPTO, ser. Lecture Notes in Computer Science, R. Safavi-Naini and R. Canetti, Eds., vol. 7417. Springer, 2012, pp. 273-293.
    • (2012) CRYPTO, Ser. Lecture Notes in Computer Science , vol.7417 , pp. 273-293
    • Jager, T.1    Kohlar, F.2    Schäge, S.3    Schwenk, J.4
  • 9
    • 84884484198 scopus 로고    scopus 로고
    • On the security of the TLS protocol: A systematic analysis
    • R. Canetti and J. A. Garay, Eds. Springer
    • H. Krawczyk, K. G. Paterson, and H. Wee, "On the security of the TLS protocol: A systematic analysis," in CRYPTO, ser. Lecture Notes in Computer Science, R. Canetti and J. A. Garay, Eds., vol. 8042. Springer, 2013, pp. 429-448.
    • (2013) CRYPTO, Ser. Lecture Notes in Computer Science , vol.8042 , pp. 429-448
    • Krawczyk, H.1    Paterson, K.G.2    Wee, H.3
  • 15
    • 84945187405 scopus 로고    scopus 로고
    • Personal communication
    • A. Langely, "Google, Personal communication," 2014.
    • (2014) Google
    • Langely, A.1
  • 26
    • 33845303377 scopus 로고    scopus 로고
    • The security and performance of the Galois/counter mode (GCM) of operation
    • Springer
    • D. A. McGrew and J. Viega, "The security and performance of the Galois/counter mode (GCM) of operation," in Progress in Cryptology-INDOCRYPT 2004. Springer, 2004, pp. 343-355.
    • (2004) Progress in Cryptology-INDOCRYPT 2004 , pp. 343-355
    • McGrew, D.A.1    Viega, J.2
  • 30
    • 84889018748 scopus 로고    scopus 로고
    • EMVCo LLC
    • EMVCo LLC, "EMV ECC key establishment protocols," 2012. [Online]. Available: http://www.emvco.com/specifications.aspx?id=243
    • (2012) EMV ECC Key Establishment Protocols
  • 31
    • 3142623034 scopus 로고    scopus 로고
    • Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm
    • M. Bellare, T. Kohno, and C. Namprempre, "Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm," ACM Trans. Inf. Syst. Secur., vol. 7, no. 2, pp. 206-241, 2004.
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , Issue.2 , pp. 206-241
    • Bellare, M.1    Kohno, T.2    Namprempre, C.3
  • 33
    • 61849089615 scopus 로고    scopus 로고
    • TCP SYN flooding attacks and common mitigations
    • Aug.
    • W. Eddy, "TCP SYN flooding attacks and common mitigations," RFC 4987 (Informational), Aug. 2007.
    • (2007) RFC 4987 (Informational)
    • Eddy, W.1
  • 35
    • 79960851625 scopus 로고    scopus 로고
    • TCP ack storm DoS attacks
    • J. Camenisch, S. Fischer-Hbner, Y. Murayama, A. Portmann, and C. Rieder, Eds. Springer
    • R. Abramov and A. Herzberg, "TCP ack storm DoS attacks," in Future Challenges in Security and Privacy for Academia and Industry, J. Camenisch, S. Fischer-Hbner, Y. Murayama, A. Portmann, and C. Rieder, Eds. Springer, 2011, pp. 29-40.
    • (2011) Future Challenges in Security and Privacy for Academia and Industry , pp. 29-40
    • Abramov, R.1    Herzberg, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.