Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

[HTML][HTML] The transport layer security (TLS) protocol version 1.3

E Rescorla - 2018 - rfc-editor.org
RFC 8446: The Transport Layer Security (TLS) Protocol Version 1.3 [RFC Home] [TEXT|PDF|HTML]
[Tracker] [IPR] [Errata] [Info page] PROPOSED STANDARD Errata Exist Internet Engineering …

A comprehensive symbolic analysis of TLS 1.3

C Cremers, M Horvat, J Hoyland, S Scott… - Proceedings of the …, 2017 - dl.acm.org
The TLS protocol is intended to enable secure end-to-end communication over insecure
networks, including the Internet. Unfortunately, this goal has been thwarted a number of …

Verified models and reference implementations for the TLS 1.3 standard candidate

K Bhargavan, B Blanchet… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
TLS 1.3 is the next version of the Transport Layer Security (TLS) protocol. Its clean-slate
design is a reaction both to the increasing demand for low-latency HTTPS connections and …

{DROWN}: Breaking {TLS} Using {SSLv2}

N Aviram, S Schinzel, J Somorovsky… - 25th USENIX Security …, 2016 - usenix.org
DROWN: Breaking TLS using SSLv2 Page 1 This paper is included in the Proceedings of the
25th USENIX Security Symposium August 10–12, 2016 • Austin, TX ISBN 978-1-931971-32-4 …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

On the practical (in-) security of 64-bit block ciphers: Collision attacks on HTTP over TLS and OpenVPN

K Bhargavan, G Leurent - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
While modern block ciphers, such as AES, have a block size of at least 128 bits, there are
many 64-bit block ciphers, such as 3DES and Blowfish, that are still widely supported in …

Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects

S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian… - Proceedings of the …, 2019 - dl.acm.org
Cryptographic API misuses, such as exposed secrets, predictable random numbers, and
vulnerable certificate verification, seriously threaten software security. The vision of …

Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities

J Ahn, R Hussain, K Kang, J Son - … Communications Surveys & …, 2025 - ieeexplore.ieee.org
Cryptographic network protocols play a crucial role in enabling secure data exchange over
insecure media in modern network environments. However, even minor vulnerabilities can …

Systematic fuzzing and testing of TLS libraries

J Somorovsky - Proceedings of the 2016 ACM SIGSAC conference on …, 2016 - dl.acm.org
We present TLS-Attacker, an open source framework for evaluating the security of TLS
libraries. TLS-Attacker allows security engineers to create custom TLS message flows and …