scispace - formally typeset
Search or ask a question

Answers from top 10 papers

More filters
Papers (10)Insight
Thus further (and more rigorous) evaluations of the HTTPS deployments in browsers appear to be necessary.
Proceedings ArticleDOI
Zhenyu Zhou, Theophilus Benson 
21 Aug 2015
12 Citations
QoS2 overcomes such attacks, by judiciously employing object level checksums which are sent exclusively over the HTTPS connection.
Proceedings ArticleDOI
Arturs Lavrenovs, F. Jesus Rubio Melon 
01 May 2018
28 Citations
Equally, HTTPS sites seem to be far more eager to implement those policies than HTTP only websites.
Proceedings ArticleDOI
Kefei Cheng, Meng Gao, Ruijie Guo 
24 Apr 2010
28 Citations
Experimental results show that three methods are effectively defensive against the HTTPS hijacking attacks.
We implemented BlindBox and showed that it is practical for settings with long-lived HTTPS connections.
It was evident that SHS-HTTPS Enforcer enforced HTTPS successfully and MITM attacks were prevented.
The research finds that the EU eSignatures proposal lacks an integral vision on the HTTPS value chain and a coherent normative assessment of the underlying values of HTTPS governance.
Findings from 240 articles and abstracts demonstrate IIS capabilities and actions in increasing vaccination rates with the goal of reducing vaccine-preventable disease.
HTTPS may introduce overhead in terms of infrastructure costs, communication latency, data usage, and energy consumption.
HTTPS may fail to provide security for multiple reasons, mostly due to certificate-based authentication failures.