ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
5
views
12
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,743
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
ICT Systems Security and Privacy Protection
Turning Active TLS Scanning to Eleven
other
Author(s):
Wilfried Mayer
,
Martin Schmiedecker
Publication date
(Online):
May 04 2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Active Travel Studies
Most cited references
12
Record
: found
Abstract
: not found
Report
: not found
The Transport Layer Security (TLS) Protocol Version 1.2
T. Dierks
,
E. Rescorla
(2008)
0
comments
Cited
75
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
The Matter of Heartbleed
Zakir Durumeric
,
Mathias Payer
,
Vern Paxson
…
(2014)
0
comments
Cited
38
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
A Search Engine Backed by Internet-Wide Scanning
Michael Bailey
,
J. Halderman
,
Ariana Mirian
…
(2015)
0
comments
Cited
29
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2017
Publication date (Online):
May 04 2017
Pages
: 3-16
DOI:
10.1007/978-3-319-58469-0_1
SO-VID:
e40a6186-9f31-4088-b8a8-9f0dad22e01b
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Turning Active TLS Scanning to Eleven
pp. 189
HyBIS: Advanced Introspection for Effective Windows Guest Protection
pp. 265
On the Use of Emojis in Mobile Authentication
Similar content
2,743
No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large
Authors:
,
,
…
The TLS Protocol Version 1.0.
Authors:
T. DIERKS
,
C. ALLEN
,
T. Dierks
…
Tumor-Infiltrating Lymphocytes (TIL), Tertiary Lymphoid Structures (TLS), and Expression of PD-1, TIM-3, LAG-3 on TIL in Invasive and In Situ Ductal Breast Carcinomas and Their Relationship with Prognostic Factors
Authors:
Elif Acar
,
Güldal Esendağlı
,
Ozan Yazıcı
…
See all similar
Cited by
1
On the Integrity of Cross-Origin JavaScripts
Authors:
Ville Leppänen
,
Joonas Salovaara
,
Jukka Ruohonen
See all cited by