2011
DOI: 10.1016/j.comcom.2010.06.016
|View full text |Cite
|
Sign up to set email alerts
|

Can internet users protect themselves? Challenges and techniques of automated protection of HTTP communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…This makes a server able to present multiple certificates on a single IP address and to ultimately host multiple HTTPS sites using different certificates on the same IP address [2]. So, SNI is a useful complement to the concepts of virtual hosting, therefore a server is able to present the correct mapping between virtual hosts and the respective certificates [11].…”
Section: F Http Proxy Filteringmentioning
confidence: 98%
See 3 more Smart Citations
“…This makes a server able to present multiple certificates on a single IP address and to ultimately host multiple HTTPS sites using different certificates on the same IP address [2]. So, SNI is a useful complement to the concepts of virtual hosting, therefore a server is able to present the correct mapping between virtual hosts and the respective certificates [11].…”
Section: F Http Proxy Filteringmentioning
confidence: 98%
“…For the handshake, however, the web server has to supply the correct virtual site's certificate. A solution for this problem is the Server Name Indication (SNI) extension of TLS [11]. SNI allows a client to specify the hostname it is attempting to connect when the TLS negotiation starts, as shown in Figure 1.…”
Section: F Http Proxy Filteringmentioning
confidence: 99%
See 2 more Smart Citations
“…Consequently, exchanging information, finding people of similar opinions, and organizing meetings and social movements have become common (Moore and Zuev, 2005;Xiao et al, 2007;Xie and Wang, 2012;Baruah, 2012). However, along with the continuous growth in the popularity of group communication tools and services, their drawbacks also become more apparent (Sakarindr and Ansari, 2010;Völker et al, 2011).…”
Section: Introductionmentioning
confidence: 99%