ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
17
views
0
references
Top references
cited by
19
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,389
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols
proceedings-article
Author(s):
N. J. Al Fardan
,
K. G. Paterson
Publication date
(Print):
May 2013
Conference name:
2013 IEEE Symposium on Security and Privacy (SP) Conference
Conference date:
June 19, 2013 - June 22, 2013
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
JMIR: Research Protocols
Author and article information
Conference
Publication date:
May 2013
Publication date (Print):
May 2013
Pages
: 526-540
Article
DOI:
10.1109/SP.2013.42
SO-VID:
f8abcd56-2aae-4f68-96f1-7667977b538b
Copyright ©
© 2013
Conference name:
2013 IEEE Symposium on Security and Privacy (SP) Conference
Conference location:
Berkeley, CA
Conference date:
June 19, 2013 - June 22, 2013
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
3,389
A TLS/DTLS 1.2 profile for the internet of things
Authors:
H. Tschofenig
,
T Fossati
S3K: scalable security with symmetric keys—DTLS key establishment for the Internet of Things
Authors:
R. SHAHID
,
S. LUDWIG
,
S DENIS
…
Datagram Transport Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP)
Authors:
T PHELAN
See all similar
Cited by
19
A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration
Authors:
Jasenka Dizdarevic
,
Francisco Carpio
,
Admela Jukan
…
A survey of microarchitectural timing attacks and countermeasures on contemporary hardware
Authors:
Qian Ge
,
Yuval Yarom
,
David Cock
…
On the Security of the TLS Protocol: A Systematic Analysis
Authors:
Hugo Krawczyk
,
Kenneth G. Paterson
,
Hoeteck Wee
See all cited by