Research Article

Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs

Figure 17

Elapsed time of correlation attempt for different cipher suites.