1 |
Oppliger, R., Hauser, R., and Basin, D., "SSL/TLS Session-Aware User Authentication," Computer & Communication, vol.41(3), pp.59-65, 2008.
|
2 |
Burkholder, P., "SSL Man-in-the-Middle Attacks," SANS Institute, p.15, 2002.
|
3 |
Bringer, J., and Chabanne H., "Trusted-HB: A Low-Cost Version of HB Secure Against Man-inthe- Middle Attacks," IEEE Transactions on Information Theory, vol.54(9), pp.4339-4342, 2008.
DOI
|
4 |
Klein, A., "HTTP Response Splitting, Web Cache Poisoning Attacks, and Related Topics," Sanctum Inc., p.31, 2004.
|
5 |
Liu, A., Yuan, Y., Wijesekera, D., and Stavrou, A., "SQLProb: a Proxy-Based Architecture Towards Preventing SQL Injection Attacks," In Proc. SAC pp.2054-2061, 2009.
|
6 |
Oppliger, R., and Gajek, S., "Effective Protection Against Phishing and Web Spoofing," In Proc. CMS, vol.3677, pp.32-41, 2005.
|
7 |
Adelsbach, A., and Gajek, S., Schwenk, J., "Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures," In Proc. ISPEC, pp.204-216, 2005.
|
8 |
W. Diffie and M.E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol.22, no.6, pp.644-654, 1976.
DOI
|
9 |
Oppliger, R., Hauser, R., and Basin, D., "SSL/TLS Session-Sware User Authentication Revisited," In Proc. COMPSEC, pp.64-70, 2008.
|
10 |
Dierks, T., and Rescorla, E., "The TLS Protocol Version 1.1," RFC 4346, 2006.
|