Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption | 0 | 0.34 | 2018 |
Identifying Security Critical Properties for the Dynamic Verification of a Processor. | 7 | 0.64 | 2017 |
A System To Verify Network Behavior Of Known Cryptographic Clients | 2 | 0.36 | 2017 |
Server-side verification of client behavior in cryptographic protocols. | 1 | 0.36 | 2016 |
Threat Model for BGP Path Security. | 0 | 0.34 | 2014 |
Signed Object Template for the Resource Public Key Infrastructure (RPKI). | 0 | 0.34 | 2012 |