Internet Requests for, HPACK: Header Compression for HTTP, 2015. ,
QUIC: A UDP-Based Secure and Reliable Transport for HTTP Internet Engineering Task Force, Tech. Rep. draft-tsvwg-quic-protocol-02, Progress. [Online]. Available, 2016. ,
HTTP/2 Semantics Using The QUIC Transport Protocol Available: https, IETF Draft, IETF, Draft, 2016. ,
Does QUIC Make the Web Faster?, 2016 IEEE Global Communications Conference (GLOBECOM), pp.1-6, 2016. ,
DOI : 10.1109/GLOCOM.2016.7841749
QUIC: Better For What And For Whom, Proceedings of IEEE International Conference on Communications (ICC), 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01565785
The Transport Layer Security (TLS) Protocol Version 1.2 Available: https, 2008. ,
DOI : 10.17487/rfc5246
The Secure Sockets Layer (SSL) Protocol Version 3.0 Available: https, 2011. ,
DOI : 10.17487/rfc6101
On the Security of TLS-DHE in the Standard Model, Advances in Cryptology ? CRYPTO 2012: 32nd Annual Cryptology Conference Proceedings, R. Safavi-Naini and R. Canetti, pp.273-293, 2012. ,
DOI : 10.1007/978-3-642-32009-5_17
How Secure and Quick is QUIC? Provable Security and Performance Analyses, 2015 IEEE Symposium on Security and Privacy, 2015. ,
DOI : 10.1109/SP.2015.21
Hands-on denial of service lab exercises using SlowLoris and RUDY, Proceedings of the 2012 Information Security Curriculum Development Conference on, InfoSecCD '12, pp.21-29, 2012. ,
DOI : 10.1145/2390317.2390321
The problem of popular primes: Logjam, 1602. ,
Drown: Breaking tls using sslv2, 25th USENIX Security Symposium (USENIX Security 16, pp.689-706, 2016. ,
A cross-protocol attack on the TLS protocol, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.62-72, 2012. ,
DOI : 10.1145/2382196.2382206
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.383.1354
On the Security of the TLS Protocol: A Systematic Analysis, pp.429-448, 2013. ,
DOI : 10.1007/978-3-642-40041-4_24
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.1193-1204, 2014. ,
DOI : 10.1145/2660267.2660308
Internet of Things: Security vulnerabilities and challenges, 2015 IEEE Symposium on Computers and Communication (ISCC), pp.180-187, 2015. ,
DOI : 10.1109/ISCC.2015.7405513
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues, IEEE Communications Surveys & Tutorials, vol.17, issue.3, pp.1294-1312, 2015. ,
DOI : 10.1109/COMST.2015.2388550
Big Data Analytics: Security and privacy challenges, 2016 IEEE Symposium on Computers and Communication (ISCC), pp.952-957, 2016. ,
DOI : 10.1109/ISCC.2016.7543859
Protecting Websites from Attack with Secure Delivery Networks, Computer, vol.48, issue.4, pp.26-34, 2015. ,
DOI : 10.1109/MC.2015.116
Web server vulnerability analysis in the context of transport layer security (tls), IJCSI International Journal of Computer Science Issues, vol.13, issue.5, pp.11-19, 2016. ,