{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T05:53:46Z","timestamp":1761630826035},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.23919\/icitst.2017.8356398","type":"proceedings-article","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T19:01:01Z","timestamp":1525978861000},"page":"274-279","source":"Crossref","is-referenced-by-count":2,"title":["Security enhancements to TLS for improved national control"],"prefix":"10.23919","author":[{"given":"Lamya","family":"Alqaydi","sequence":"first","affiliation":[]},{"given":"Chan Yeob","family":"Yeun","sequence":"additional","affiliation":[]},{"given":"Ernesto","family":"Damiani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"470","article-title":"Automated analysis and verificationof TLS 1. 3: 0-RTT, resumption and delayed authentication","author":"cremers","year":"0","journal-title":"IEEE Symposium on Security and Privacy SP 2016"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_14"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.34"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26617-6_5"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_10"},{"journal-title":"A cryptographic analysis of the TLS 1 3 draft-10 full and pre-shared key handshake protocol","year":"2016","author":"dowling","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813653"},{"journal-title":"Mozilla Security Blog","year":"2014","author":"barnes","key":"ref10"},{"journal-title":"How exactly does the OpenSSL TLS heartbeat (Heartbleed) exploit work?","year":"0","key":"ref11"},{"journal-title":"The SSL 3 0 protocol","year":"1996","author":"freier","key":"ref12"},{"key":"ref13","article-title":"The SSL Protocol","author":"kipp","year":"1995","journal-title":"Netscape Communications Corp Protocol Version 1 1 RFC 4346"},{"journal-title":"The TLSProtocol Version 1 0&#x201D; RFC 2246","year":"1999","author":"dierks","key":"ref14"},{"journal-title":"SRTP Memory Leak","year":"2014","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7507"},{"journal-title":"This POODLE Bites Exploiting The SSL 3 0 Fallback","year":"2014","key":"ref17"},{"journal-title":"Lucky 13-a new attack against SSL\/TLS","year":"2014","key":"ref18"},{"journal-title":"A Challenging but Feasible Block wiseAdaptive Chosen-Plaintext Attack on Ssl","year":"2014","author":"bard","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.14"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6101"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978423"},{"key":"ref3","first-page":"53","article-title":"Survey on certificateless public key cryptography","author":"al housani","year":"2011","journal-title":"proceedings of International Conference for Intemet Technology and Secured Transactions"},{"journal-title":"The TLSProtocol","year":"1999","author":"dierks","key":"ref6"},{"key":"ref29","first-page":"1185","article-title":"On the security of TLS 1. 3 and QUIC against weaknesses in PKCS#1 v1. 5 encryption","author":"jager","year":"0","journal-title":"22nd ACM Conference on Computer and Communications Security"},{"journal-title":"This POODLE Bites Exploiting The SSL 3 0 Fallback","year":"2014","author":"moller","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43414-7_8"},{"journal-title":"Imperial Violet Poodle attacks on SSLv3","year":"2014","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0434-9"},{"journal-title":"On the Security of RC4 in TLS","year":"0","author":"alfardan","key":"ref9"},{"key":"ref1","article-title":"Secure m-commerce with WPKI","author":"yeun","year":"2001","journal-title":"proceedings of 1st International Workshop for Asian PKI"},{"journal-title":"A Technical Comparison of IPSec and SSL","year":"2014","author":"alshamsi","key":"ref20"},{"journal-title":"Virtual Host Confusion Weaknesses and Exploits","year":"2014","author":"delignat-lavaud","key":"ref22"},{"journal-title":"BlackHat2014 USA_Prompt _ 20140808-Cryptographic Protocol Evaluation toward Long-Lived Outstanding Security Consortium (CELLOS)","year":"0","key":"ref21"},{"journal-title":"IBMWebSphere Developer Technical Journal Using the Java Secure Socket Extension in WebSphere ApplicationServer","year":"2014","key":"ref24"},{"journal-title":"Hackers Break SSL Encryption Used by Millions of Sites","year":"2011","author":"goodin","key":"ref23"},{"key":"ref26","first-page":"526","article-title":"Lucky thirteen: Breaking the TLS and DTLSrecord protocols","author":"alfardan","year":"0","journal-title":"2013 IEEE Symposium on Security and Privacy"},{"journal-title":"Introduction to Secure Sockets Layer","year":"2014","key":"ref25"}],"event":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2017,12,11]]},"location":"Cambridge","end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8354335\/8356324\/08356398.pdf?arnumber=8356398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,28]],"date-time":"2018-05-28T20:24:23Z","timestamp":1527539063000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8356398\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":36,"URL":"https:\/\/doi.org\/10.23919\/icitst.2017.8356398","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}