首页> 外文期刊>Automatic Control and Computer Sciences >Approaches to Protection of Applications Based on the TLS Protocol against Attacks Using Revoked Certificates
【24h】

Approaches to Protection of Applications Based on the TLS Protocol against Attacks Using Revoked Certificates

机译:基于TLS协议保护应用程序的方法,防止使用撤销证书的攻击

获取原文
获取原文并翻译 | 示例
           

摘要

This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.
机译:本文认为基于TLS协议的应用程序安全问题。 描述了这些应用程序在使用撤销证书的攻击下攻击时的场景。 比较了当前检查与TLS协议一起使用的X.509公钥基础架构证书的状态的当前方法,并指定了它们的强弱点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号