M. Belshe, R. Peon, M. Thomson, R. Editor, ]. R. Peon et al., Internet Requests for, HPACK: Header Compression for HTTP, 2015.

J. Iyengar, I. Swett, R. Hamilton, and A. Wilk, QUIC: A UDP-Based Secure and Reliable Transport for HTTP Internet Engineering Task Force, Tech. Rep. draft-tsvwg-quic-protocol-02, Progress. [Online]. Available, 2016.

R. Shade and M. Warres, HTTP/2 Semantics Using The QUIC Transport Protocol Available: https, IETF Draft, IETF, Draft, 2016.

P. Biswal and O. Gnawali, Does QUIC Make the Web Faster?, 2016 IEEE Global Communications Conference (GLOBECOM), pp.1-6, 2016.
DOI : 10.1109/GLOCOM.2016.7841749

S. Cook, B. Mathieu, P. Truong, and I. Hamchaoui, QUIC: Better For What And For Whom, Proceedings of IEEE International Conference on Communications (ICC), 2017.
URL : https://hal.archives-ouvertes.fr/hal-01565785

T. Dierks, The Transport Layer Security (TLS) Protocol Version 1.2 Available: https, 2008.
DOI : 10.17487/rfc5246

A. O. Freier, P. Karlton, and P. C. Kocher, The Secure Sockets Layer (SSL) Protocol Version 3.0 Available: https, 2011.
DOI : 10.17487/rfc6101

T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, On the Security of TLS-DHE in the Standard Model, Advances in Cryptology ? CRYPTO 2012: 32nd Annual Cryptology Conference Proceedings, R. Safavi-Naini and R. Canetti, pp.273-293, 2012.
DOI : 10.1007/978-3-642-32009-5_17

R. Lychev, S. Jero, A. Boldyreva, and C. Nita-rotaru, How Secure and Quick is QUIC? Provable Security and Performance Analyses, 2015 IEEE Symposium on Security and Privacy, 2015.
DOI : 10.1109/SP.2015.21

E. Damon, J. Dale, E. Laron, J. Mache, N. Land et al., Hands-on denial of service lab exercises using SlowLoris and RUDY, Proceedings of the 2012 Information Security Curriculum Development Conference on, InfoSecCD '12, pp.21-29, 2012.
DOI : 10.1145/2390317.2390321

W. Bokslag, The problem of popular primes: Logjam, 1602.

N. Aviram, S. Schinzel, J. Somorovsky, N. Heninger, M. Dankel et al., Drown: Breaking tls using sslv2, 25th USENIX Security Symposium (USENIX Security 16, pp.689-706, 2016.

N. Mavrogiannopoulos, F. Vercauteren, V. Velichkov, and B. Preneel, A cross-protocol attack on the TLS protocol, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.62-72, 2012.
DOI : 10.1145/2382196.2382206

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.383.1354

H. Krawczyk, K. G. Paterson, and H. Wee, On the Security of the TLS Protocol: A Systematic Analysis, pp.429-448, 2013.
DOI : 10.1007/978-3-642-40041-4_24

M. Fischlin and F. Günther, Multi-Stage Key Exchange and the Case of Google's QUIC Protocol, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.1193-1204, 2014.
DOI : 10.1145/2660267.2660308

I. Andrea, C. Chrysostomou, and G. Hadjichristofi, Internet of Things: Security vulnerabilities and challenges, 2015 IEEE Symposium on Computers and Communication (ISCC), pp.180-187, 2015.
DOI : 10.1109/ISCC.2015.7405513

J. Granjal, E. Monteiro, and J. S. Silva, Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues, IEEE Communications Surveys & Tutorials, vol.17, issue.3, pp.1294-1312, 2015.
DOI : 10.1109/COMST.2015.2388550

Y. Gahi, M. Guennoun, and H. T. Mouftah, Big Data Analytics: Security and privacy challenges, 2016 IEEE Symposium on Computers and Communication (ISCC), pp.952-957, 2016.
DOI : 10.1109/ISCC.2016.7543859

D. Gillman, Y. Lin, B. Maggs, and R. K. Sitaraman, Protecting Websites from Attack with Secure Delivery Networks, Computer, vol.48, issue.4, pp.26-34, 2015.
DOI : 10.1109/MC.2015.116

M. S. Haque, Web server vulnerability analysis in the context of transport layer security (tls), IJCSI International Journal of Computer Science Issues, vol.13, issue.5, pp.11-19, 2016.