1 |
E. Rescorla and A.Schiffman, The Secure HyperText Transfer Protocol(1999), Retrieved Dec., 20, 2016, from https://tools.ietf.org/html/rfc2660
|
2 |
HTTPS usage statistics on top websites(2016), Retrieved Nov., 29, 2016, from statoperator, https://statoperator.com/research/https-usage-statistics-on-top-websites/
|
3 |
Josh Aas, Enabling HTTP Over SSL(2016), Retrieved Nov., 29, 2016, from https://letsenc rypt.org/2016/06/22/https-progress-june-2016.html
|
4 |
J. Hodges and C. Jackson, HTTP Strict Transport Security(2012), Retrieved Dec., 20, 2016, from https://tools.ietf.org/html/rfc6797
|
5 |
T. Socolofsky and C. Kale, A TCP/IP Tutorial(1991), Retrieved Dec., 20, 2016, from https://tools.ietf.org/html/rfc1180
|
6 |
W. J. Choi, Ramneek, and W. J. Seok, "Yellow-light TCP: Energy-saving protocol for mobile data transmission," J. KICS, vol. 40, no. 03, pp. 478-490, Mar. 2015.
DOI
|
7 |
Microsoft, Explanation of the 3-way Handshake via TCP/IP, Retrieved Nov., 28, 2016, from https://support.microsoft.com/en-us/kb/172983
|
8 |
A. Freier, P. Karlton, and P. Kocher, The Secure Sockets Layer(SSL) Protocol Version 3.0(2001), Retrieved Nov, 21, 2016, from https://tools.ietf.org/html/rfc6101
|
9 |
T. Dierks and C. Allen, The TLS Protocol Version 1.0(1991), Retrieved Nov., 21, 2016, from https://www.ietf.org/rfc/rfc2246.txt
|
10 |
IBM, Supported SSL and Transport Layer Security protocols, Retrieved Nov., 26, 2016, from http://www.ibm.com/support/knowledgecenter/ko/ssw_ibm_i_72/rzain/rzainrzaintls.htm
|
11 |
G. T. Park, H. J. Han, and J. H. Lee, "Design and implementation of lightweight encryption algorithm on OpenSSL," J. KICS, vol. 39B, no. 12, pp. 822-830, Dec. 2014.
DOI
|
12 |
S. M. Kim, J. S. Park, S. H. Yoon, J. H. Kim, S. O. Choi, and M. S. Kim, "Service identification method for encrypted traffic based on SSL/TLS," J. KICS, vol. 40, no. 11, pp. 2160-2168, Nov. 2015.
DOI
|
13 |
IBM, How SSL and TLS provide identification, authentication, confidentiality, and integrity, Retrieved Nov., 26, 2016, from http://www.ibm.com/support/knowledgecenter/en/SSFKSJ_7.1.0/com.ibm.mq.doc/sy10670_.htm
|
14 |
A. Langley, Transport Layer Security (TLS) Snap Start(2010), Retrieved Nov., 26, 2016, from https://tools.ietf.org/html/draft-agl-tls-snapstart-00
|
15 |
E. Stark, LS. Huang, D. Israni, C. Jackson, and D. Boneh, "The case for prefetching and prevalidating TLS server certificate," in Proc. Netw. and Distrib. Sys. Secur. Symp. 2012, San Diego, USA, Feb. 2012.
|
16 |
R. Braud, Measuring Performance with HTTP Proxies(2013), Retrieved Feb., 13, 2017, from https://blog.thousandeyes.com/measuring-performance-with-http-proxies
|
17 |
Gordon McKinney, TCP state Transition Diagram(2002), Retrieved Dec., 17, 2016, from http://www.cs.northwestern.edu/-agupta/cs340/project2/TCPIP_State_Transition_Diagram.pdf
|