Website, 2010. ,
Handbook of Applied Cryptography, 1996. ,
DOI : 10.1201/9781439821916
Shellcoders Handbook, 2004. ,
Detecting Malicious JavaScript Code in Mozilla, 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'05), pp.85-94, 2005. ,
DOI : 10.1109/ICECCS.2005.35
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection, Proceedings of The Sixth International Symposium on Recent Advances in Intrusion Detection (RAID'03), pp.220-237, 2003. ,
DOI : 10.1007/978-3-540-45248-5_13
Detecting Anomalous Network Traffic with Self-organizing Maps, Proceedings of The Sixth International Symposium on Recent Advances in Intrusion Detection (RAID'03), pp.36-54, 2003. ,
DOI : 10.1007/978-3-540-45248-5_3
Network Intrusion Detection -An Analyst's Handbook, New Riders, 1999. ,
Identity-based cryptography and signature schemes, Proceedings of Advances in Cryptology (CRYPTO'84), pp.47-53, 1985. ,
Identity-based encryption from the weil pairing, Proceedings of The 21st Annual International Cryptology Conference on Advances in Cryptology CRYPTO'01, pp.213-229, 2001. ,
Fuzzy Identity-Based Encryption, Proceedings of Advances in Cryptology (Eurocrypt'05), pp.457-473, 2005. ,
DOI : 10.1007/11426639_27
Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007. ,
DOI : 10.1109/SP.2007.11
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006. ,
DOI : 10.1145/1180405.1180418
Unlocking the armour : enabling intrusion detection and analysis of encrypted traffic streams, Proceedings of New Knowledge Today Conference (ISSA KTC'05), pp.1-10, 2005. ,
Intrusion Detection for Encrypted Web Accesses, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), pp.569-576, 2007. ,
DOI : 10.1109/AINAW.2007.212
Description of a new variable-length key, 64-bit block cipher (Blowfish), Proceedings of Fast Software Encryption (FSE'93), pp.191-204, 1993. ,
DOI : 10.1007/3-540-58108-1_24
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate, Proceedings of 29th Annual international Cryptology Conference on Advances in Cryptology (CRYPTO'09), pp.55-69, 2009. ,
DOI : 10.1007/978-3-642-03356-8_4
SSL Man in the Middle Proxy, 2010. ,
Website: http://ettercap.sf.net, 2010. ,