Open Access
MATEC Web of Conferences
Volume 56, 2016
2016 8th International Conference on Computer and Automation Engineering (ICCAE 2016)
Article Number 01006
Number of page(s) 5
Section Computer and Information technologies
Published online 26 April 2016
  1. Information on: https:/
  2. Information on:
  3. Information on:
  4. Dierks T, Rescorla E. The Transport Layer Security (TLS) Protocol. Version 1.1. In: E R, editor. (2006)
  5. Information on:
  6. Haojun Z, Xiaoxue L, Rui R. A Novel Self-Renewal Hash Chain and Its Implementation. 2008 IEEE/IFIP InterNational Conference on Embedded and Ubiquitous Computing. Shanghai, p.144–149 (2008)
  7. Xiao-Yuan Y, Jia-Yong C, Jing-Jing W. A Self-Renewal Hash Chain Scheme Based on Fair Exchange Idea(SRHC-FEI). 3rd IEEE International Conference on Computer Science and Information Technology. Sichuan, p.152–156 (2010)
  8. Alabrah A, Bassiouni M. A Hierarchical Two-Tier One-way Hash Chain Protocol for Secure Internet Transactions. Anaheim, CA, p.868–873 (2012)
  9. Jun-Huy L, Sang-Gon L, Hoon-Jae L, Eko OY. Securing Distributed SDN with IBC. ICUFN 2015. Sapporo, p.921–925 (2015)
  10. Santos MAS, Nunes BAA, Obraczka K, Turletti T, de Oliveira and Cintia B. Margi BT. Decentralizing SDN’s Control Plane. 39th Annual IEEE Conference on Local Computer Networks. Edmonton, AB, p.402–405(2014)
  11. PAULSON LC. Inductive Analysis of the Internet Protocol TLS. ACM Transactions on Information and System Security. 2, 3, p.332–351(1999) [CrossRef]
  12. Apostolopoulos G, Peris V, Saha D. Transport Layer Security: How much does it really cost. INFOCOM ‘99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. New York, p.717–725(1999)