Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates
Crossref DOI link: https://doi.org/10.3103/S0146411616080290
Published Online: 2017-02-08
Published Print: 2016-12
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Busygin, A. G.
Konoplev, A. S.
Kalinin, M. O.
License valid from 2016-12-01