Cited By
View all- Zineddine AChakir OSadqi YMaleh YSingh Gaba GGurtov ADev K(2024)A systematic review of cybersecurity assessment methods for HTTPSComputers and Electrical Engineering10.1016/j.compeleceng.2024.109137115:COnline publication date: 1-Apr-2024
- Yoon DChung TKim Y(2023)Delegation of TLS Authentication to CDNs using Revocable Delegated CredentialsProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627144(113-123)Online publication date: 4-Dec-2023
- Dong HShu HPrakash VZhang YParacha MChoffnes DTorres-Arias SHuang DSun YMontpetit MLeivadeas AUhlig SJaved M(2023)Behind the Scenes: Uncovering TLS and Server Certificate Practice of IoT Device Vendors in the WildProceedings of the 2023 ACM on Internet Measurement Conference10.1145/3618257.3624815(457-477)Online publication date: 24-Oct-2023
- Show More Cited By