Fig. 2From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprintingA SSL/TLS handshakeBack to article page