[HTML][HTML] Virtual reality for health professions education: systematic review and meta-analysis by the digital health education collaboration

BM Kyaw, N Saxena, P Posadzki, J Vseteckova… - Journal of medical …, 2019 - jmir.org
Background Virtual reality (VR) is a technology that allows the user to explore and
manipulate computer-generated real or artificial three-dimensional multimedia sensory …

A survey of man in the middle attacks

M Conti, N Dragoni, V Lesyk - IEEE communications surveys & …, 2016 - ieeexplore.ieee.org
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer
security, representing one of the biggest concerns for security professionals. MITM targets …

A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies

S Khan, F Luo, Z Zhang, F Ullah, F Amin… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …

Security issues in cloud environments: a survey

DAB Fernandes, LFB Soares, JV Gomes… - International journal of …, 2014 - Springer
In the last few years, the appealing features of cloud computing have been fueling the
integration of cloud environments in the industry, which has been consequently motivating …

Third-party web tracking: Policy and technology

JR Mayer, JC Mitchell - 2012 IEEE symposium on security and …, 2012 - ieeexplore.ieee.org
In the early days of the web, content was designed and hosted by a single person, group, or
organization. No longer. Webpages are increasingly composed of content from myriad …

Measuring {HTTPS} adoption on the web

AP Felt, R Barnes, A King, C Palmer, C Bentzel… - 26th USENIX security …, 2017 - usenix.org
HTTPS ensures that the Web has a base level of privacy and integrity. Security engineers,
researchers, and browser vendors have long worked to spread HTTPS to as much of the …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS

K Bhargavan, AD Lavaud, C Fournet… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
TLS was designed as a transparent channel abstraction to allow developers with no
cryptographic expertise to protect their application against attackers that may control some …

Analyzing forged SSL certificates in the wild

LS Huang, A Rice, E Ellingsen… - 2014 IEEE Symposium …, 2014 - ieeexplore.ieee.org
The SSL man-in-the-middle attack uses forged SSL certificates to intercept encrypted
connections between clients and servers. However, due to a lack of reliable indicators, it is …

Password managers: Attacks and defenses

D Silver, S Jana, D Boneh, E Chen… - 23rd USENIX Security …, 2014 - usenix.org
We study the security of popular password managers and their policies on automatically
filling in Web passwords. We examine browser built-in password managers, mobile …