Cited By
View all- Toapanta SZamora MGallegos L(2019)Appropriate Security Protocols to Mitigate the Risks in Electronic Money ManagementSmart Trends in Computing and Communications10.1007/978-981-15-0077-0_7(65-74)Online publication date: 4-Dec-2019
Recent discoveries of widespread vulnerabilities in the SSL/TLS protocol stack, particular with regard to the verification of server certificates, has left the security of the Internet's communications in doubt. Newly proposed SSL trust enhancements ...
The SSL and TLS infrastructure used in important protocols like HTTPs and IMAPs is built on an X.509 public-key infrastructure (PKI). X.509 certificates are thus used to authenticate services like online banking, shopping, e-mail, etc. However, it ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in