DNS-Based Dynamic Authentication for Microservices in IoT
暂无分享,去创建一个
[1] Marta E. Mangelsdorf. How Secure Is the Internet , 2007 .
[2] Scott Rose,et al. Protocol Modifications for the DNS Security Extensions , 2005, RFC.
[3] Giuseppe Ateniese,et al. On the Key Exposure Problem in Chameleon Hashes , 2004, SCN.
[4] Warwick Ford,et al. Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework , 1999, RFC.
[5] Jeff Hodges,et al. HTTP Strict Transport Security (HSTS) , 2012, RFC.
[6] Paul E. Hoffman,et al. The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA , 2012, RFC.
[7] Moxie Marlinspike,et al. Trust Assertions for Certificate Keys , 2013 .
[8] Stefan Santesson. Internet X.509 Public Key Infrastructure Subject Alternative Name for Expression of Service Name , 2007, RFC.
[9] Scott Rose,et al. Resource Records for the DNS Security Extensions , 2005, RFC.
[10] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[11] David Chaum,et al. Convertible Undeniable Signatures , 1990, CRYPTO.
[12] Hugo Krawczyk,et al. Chameleon Hashing and Signatures , 1998, IACR Cryptol. ePrint Arch..
[13] J. Alex Halderman,et al. Analysis of the HTTPS certificate ecosystem , 2013, Internet Measurement Conference.