T. The and . Protocol, Website, 2010.

A. J. Menezes, P. C. Van-oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, 1996.
DOI : 10.1201/9781439821916

J. Koziol, D. Litchfield, D. Aitel, C. Anley, S. Eren et al., Shellcoders Handbook, 2004.

O. Hallaraker and G. Vigna, Detecting Malicious JavaScript Code in Mozilla, 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'05), pp.85-94, 2005.
DOI : 10.1109/ICECCS.2005.35

M. V. Mahoney and P. K. Chan, An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection, Proceedings of The Sixth International Symposium on Recent Advances in Intrusion Detection (RAID'03), pp.220-237, 2003.
DOI : 10.1007/978-3-540-45248-5_13

M. Ramadas, S. Ostermann, and B. C. Tjaden, Detecting Anomalous Network Traffic with Self-organizing Maps, Proceedings of The Sixth International Symposium on Recent Advances in Intrusion Detection (RAID'03), pp.36-54, 2003.
DOI : 10.1007/978-3-540-45248-5_3

S. Northcutt, Network Intrusion Detection -An Analyst's Handbook, New Riders, 1999.

A. Shamir, Identity-based cryptography and signature schemes, Proceedings of Advances in Cryptology (CRYPTO'84), pp.47-53, 1985.

M. K. Boneh, Identity-based encryption from the weil pairing, Proceedings of The 21st Annual International Cryptology Conference on Advances in Cryptology CRYPTO'01, pp.213-229, 2001.

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, Proceedings of Advances in Cryptology (Eurocrypt'05), pp.457-473, 2005.
DOI : 10.1007/11426639_27

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007.
DOI : 10.1109/SP.2007.11

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006.
DOI : 10.1145/1180405.1180418

B. Irwin, Unlocking the armour : enabling intrusion detection and analysis of encrypted traffic streams, Proceedings of New Knowledge Today Conference (ISSA KTC'05), pp.1-10, 2005.

A. Yamada, Y. Miyake, K. Takemori, A. Studer, and A. Perrig, Intrusion Detection for Encrypted Web Accesses, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), pp.569-576, 2007.
DOI : 10.1109/AINAW.2007.212

B. Schneier, Description of a new variable-length key, 64-bit block cipher (Blowfish), Proceedings of Fast Software Encryption (FSE'93), pp.191-204, 1993.
DOI : 10.1007/3-540-58108-1_24

M. Stevens, A. Sotirov, and J. Appelbaum, Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate, Proceedings of 29th Annual international Cryptology Conference on Advances in Cryptology (CRYPTO'09), pp.55-69, 2009.
DOI : 10.1007/978-3-642-03356-8_4

D. Boneh, S. Inguva, and I. Baker, SSL Man in the Middle Proxy, 2010.

. Ettercap, Website: http://ettercap.sf.net, 2010.