首页 | 本学科首页   官方微博 | 高级检索  
     


Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates
Authors:A G Busygin  A S Konoplev  M O Kalinin
Affiliation:1.Peter the Great St. Petersburg Polytechnic University,St. Petersburg,Russia
Abstract:This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.
Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号