-
2
-
-
0034581037
-
Ten risks of PKI: What you're not being told about public key infrastructure
-
C. Ellison and B. Schneier, "Ten Risks of PKI: What You're Not Being Told about Public Key Infrastructure," Computer Security J., vol. 16, no. 1, 2000, pp. 1-7. (Pubitemid 30565287)
-
(2000)
Computer Security Journal
, vol.16
, Issue.1
, pp. 1-7
-
-
Ellison Carl1
Schneier Bruce2
-
3
-
-
0036684150
-
PKI: It's not dead, just resting
-
DOI 10.1109/MC.2002.1023787
-
P. Gutmann, "PKI: It's Not Dead, Just Resting," Computer, vol. 35, no. 8, 2002, pp. 41-49. (Pubitemid 34950479)
-
(2002)
Computer
, vol.35
, Issue.8
, pp. 41-49
-
-
Gutmann, P.1
-
4
-
-
27844462024
-
Why have public key infrastructures failed so far?
-
DOI 10.1108/10662240510629475
-
J. Lopez, R. Oppliger, and G. Pernul, "Why Have Public Key Infrastructures Failed So Far?" Internet Research, vol. 15, no. 5, 2005, pp. 544-556. (Pubitemid 41649219)
-
(2005)
Internet Research
, vol.15
, Issue.5
, pp. 544-556
-
-
Lopez, J.1
Oppliger, R.2
Pernul, G.3
-
6
-
-
0003344055
-
X.509 Internet public key infrastructure online certificate status protocol-OCSP
-
June
-
M. Myers et al., X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP, IETF RFC 2560, June 1999; http://tools.ietf. org/html/rfc2560.
-
(1999)
IETF RFC
, pp. 2560
-
-
Myers, M.1
-
7
-
-
84857080633
-
Certified lies: Detecting and defeating government interception attacks against SSL
-
Springer
-
C. Soghoian and S. Stamm, "Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL," LNCS 7035, Springer, 2012, pp. 250-259.
-
(2012)
LNCS
, vol.7035
, pp. 250-259
-
-
Soghoian, C.1
Stamm, S.2
-
8
-
-
49849102924
-
SSL/TLS session-aware user authentication
-
R. Oppliger, R. Hauser, and D. Basin, "SSL/TLS Session-Aware User Authentication," Computer, vol. 41, no. 3, 2008, pp. 59-65.
-
(2008)
Computer
, vol.41
, Issue.3
, pp. 59-65
-
-
Oppliger, R.1
Hauser, R.2
Basin, D.3
-
9
-
-
79957616447
-
Stuxnet: Dissecting a cyberwarfare weapon
-
R. Langner, "Stuxnet: Dissecting a Cyberwarfare Weapon," IEEE Security & Privacy, vol. 9, no. 3, 2011, pp. 49-51.
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.3
, pp. 49-51
-
-
Langner, R.1
-
11
-
-
84883884005
-
A certificate revocation scheme for a large-scale highly replicated distributed system
-
IEEE CS
-
B.C. Popescu, B. Crispo, and A.S. Tanenbaum, "A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System," Proc. 8th IEEE Int'l Symp. Computers and Communication (ISCC), IEEE CS, 2003, pp. 225-231.
-
(2003)
Proc. 8th IEEE Int'l Symp. Computers and Communication (ISCC)
, pp. 225-231
-
-
Popescu, B.C.1
Crispo, B.2
Tanenbaum, A.S.3
-
12
-
-
70849094703
-
Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile
-
May
-
D. Cooper et al., Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, IETF RFC 5280, May 2008; http://tools.ietf.org/html/rfc5280.
-
(2008)
IETF RFC
, pp. 5280
-
-
Cooper, D.1
-
13
-
-
85180773761
-
Building certification paths: Forward vs. Reverse
-
(NDSS 2001), ISOC
-
Y. Elley et al., "Building Certification Paths: Forward vs. Reverse," Proc. 2001 Network and Distributed System Security Symp. (NDSS 2001), ISOC, 2001, pp. 153-160.
-
(2001)
Proc. 2001 Network and Distributed System Security Symp
, pp. 153-160
-
-
Elley, Y.1
-
16
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, 1979, pp. 612-613.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
17
-
-
84890868305
-
Public key pinning extension for HTTP
-
work in progress, June
-
C. Evans, C. Palmer, and R. Sheeri, "Public Key Pinning Extension for HTTP," IETF Internet draft, work in progress, June 2013.
-
(2013)
IETF Internet Draft
-
-
Evans, C.1
Palmer, C.2
Sheeri, R.3
-
18
-
-
85030249800
-
Use cases and requirements for dns-based authentication of named entities (DANE)
-
Oct.
-
R. Barnes, Use Cases and Requirements for DNS-Based Authentication of Named Entities (DANE), IETF RFC 6394, Oct. 2011; http://tools.ietf.org/html/ rfc6394.
-
(2011)
IETF RFC
, pp. 6394
-
-
Barnes, R.1
-
19
-
-
84896456960
-
The dns-based authentication of named entities (dane) transport layer security (tls) protocol: Tlsa
-
Aug.
-
P. Hoffman and J. Schlyter, The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA, IETF RFC 6698, Aug. 2012; http://tools.ietf.org/html/rfc6698.
-
(2012)
IETF RFC
, pp. 6698
-
-
Hoffman, P.1
Schlyter, J.2
-
20
-
-
33144460479
-
DNS security introduction and requirements
-
Mar.
-
R. Arends et al., DNS Security Introduction and Requirements, IETF RFC 4033, Mar. 2005; http://tools. ietf.org/html/rfc4033.
-
(2005)
IETF RFC
, pp. 4033
-
-
Arends, R.1
-
21
-
-
85034040740
-
Perspectives: Improving ssh-style host authentication with multi-path probing
-
Usenix Assoc.
-
D. Wendtandt, D.G. Andersen, and A. Perrig, "Perspectives: Improving SSH-Style Host Authentication with Multi-Path Probing," Proc. Usenix 2008 Annual Tech. Conf. (ATC 08), Usenix Assoc., 2008, pp. 321-334.
-
(2008)
Proc. Usenix 2008 Annual Tech. Conf. (ATC 08)
, pp. 321-334
-
-
Wendtandt, D.1
Andersen, D.G.2
Perrig, A.3
|