메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Truncating TLS connections to violate beliefs in web applications

Author keywords

Attack; Authentication; Exploit; Google; Helios; Logical flaw; Microsoft; Sign out; Single sign on; TLS truncation; Web applications

Indexed keywords

AUTHENTICATION; ELECTRONIC VOTING;

EID: 85084163394     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (17)

References (23)
  • 4
    • 37849035280 scopus 로고    scopus 로고
    • On the robustness of applications based on the SSL and TLS security protocols
    • Diana Berbecaru and Antonio Lioy. On the Robustness of Applications Based on the SSL and TLS Security Protocols. In Public Key Infrastructure, volume 4582, pages 248–264. 2007.
    • (2007) Public Key Infrastructure , vol.4582 , pp. 248-264
    • Berbecaru, D.1    Lioy, A.2
  • 7
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Danny Dolev and Andrew C. Yao. On the security of public key protocols. Information Theory, 29:198–208, 1983.
    • (1983) Information Theory , vol.29 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 12
    • 85080516480 scopus 로고    scopus 로고
    • IACR Elections. http://www.iacr.org/elections/, 2013.
    • (2013) IACR Elections
  • 17
    • 2942597551 scopus 로고    scopus 로고
    • RFC 2818, Internet Engineering Task Force
    • E. Rescorla. HTTP Over TLS. RFC 2818, Internet Engineering Task Force, 2000.
    • (2000) HTTP over TLS
    • Rescorla, E.1
  • 23
    • 77958136467 scopus 로고    scopus 로고
    • Session management vulnerabilities in today’s web
    • C.A. Vlsaggio and L.C. Blasio. Session management vulnerabilities in today’s web. Security Privacy, IEEE, 8(5):48–56, 2010.
    • (2010) Security Privacy, IEEE , vol.8 , Issue.5 , pp. 48-56
    • Vlsaggio, C.A.1    Blasio, L.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.