Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Joyanta Debnath"'
Publikováno v:
CCS
The X.509 Public-Key Infrastructure (PKI) standard is widely used as a scalable and flexible authentication mechanism. Flaws in X.509 implementations can make relying applications susceptible to impersonation attacks or interoperability issues. In pr
Autor:
Kin Man Leung, Endadul Hoque, Mohsen Minaei, Omar Chowdhury, Man Hong Hue, Joyanta Debnath, Kailiang Xian, Sze Yiu Chau, M. Hammad Mazhar, Li Li
Publikováno v:
CCS
In this paper, we perform the first multifaceted measurement study to investigate the widespread insecure practices employed by tertiary education institutes (TEIs) around the globe when offering WPA2-Enterprise Wi-Fi services. The security of such s
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030578077
Increasingly more mobile browsers are developed to use proxies for traffic compression and censorship circumvention. While these browsers can offer such desirable features, their security implications are, however, not well understood, especially whe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d215cce407228fd780988de71051c73d
https://doi.org/10.1007/978-3-030-57808-4
https://doi.org/10.1007/978-3-030-57808-4
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783030578770
ACNS (2)
ACNS (2)
Increasingly more mobile browsers are developed to use proxies for traffic compression and censorship circumvention. While these browsers can offer such desirable features, their security implications are, however, not well understood, especially whe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::154657a9ff92b42ff3df6c3fd26dde1b
https://doi.org/10.1007/978-3-030-57878-7_19
https://doi.org/10.1007/978-3-030-57878-7_19