Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates


如何引用文章

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.

作者简介

A. Busygin

Peter the Great St. Petersburg Polytechnic University

编辑信件的主要联系方式.
Email: busygin_ag@hotmail.com
俄罗斯联邦, St. Petersburg, 195251

A. Konoplev

Peter the Great St. Petersburg Polytechnic University

Email: busygin_ag@hotmail.com
俄罗斯联邦, St. Petersburg, 195251

M. Kalinin

Peter the Great St. Petersburg Polytechnic University

Email: busygin_ag@hotmail.com
俄罗斯联邦, St. Petersburg, 195251

补充文件

附件文件
动作
1. JATS XML

版权所有 © Allerton Press, Inc., 2016