-
3
-
-
33751508709
-
-
NIST Special Publication 800-57
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid. Recommendation for Key Management { Part 1: General (Revision 3), 2012. NIST Special Publication 800-57.
-
(2012)
Recommendation for Key Management { Part 1: General (Revision 3)
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
6
-
-
51049122345
-
-
IETF RFC-5280, May
-
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF RFC-5280, May 2008.
-
(2008)
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
-
-
Cooper, D.1
Santesson, S.2
Farrell, S.3
Boeyen, S.4
Housley, R.5
Polk, W.6
-
9
-
-
84910125196
-
The matter of heartbleed
-
Z. Durumeric, J. Kasten, F. Li, J. Amann, J. Beekman, M. Payer, N. Weaver, J. A. Halderman, V. Paxson, and M. Bailey. The matter of Heartbleed. In ACM Internet Measurement Conference (IMC), 2014.
-
(2014)
ACM Internet Measurement Conference (IMC)
-
-
Durumeric, Z.1
Kasten, J.2
Li, F.3
Amann, J.4
Beekman, J.5
Payer, M.6
Weaver, N.7
Halderman, J.A.8
Paxson, V.9
Bailey, M.10
-
11
-
-
80053025624
-
An observatory for the ssliverse
-
P. Eckersley and J. Burns. An observatory for the SSLiverse. In Defcon 18, 2010. https://www.eff.org/files/DefconSSLiverse.pdf.
-
(2010)
Defcon
, vol.18
-
-
Eckersley, P.1
Burns, J.2
-
14
-
-
84910124553
-
-
Faketime library. http://www.code-wizards.com/projects/libfaketime/.
-
Faketime Library
-
-
-
18
-
-
84865606447
-
-
Revocation doesn't work. https://www.imperialviolet.org/2011/03/18/revocation.html.
-
Revocation Doesn't Work
-
-
-
19
-
-
84878718671
-
Building a time machine for eficient recording and retrieval of high-volume network trafic
-
S. Kornexl, V. Paxson, H. Dreger, A. Feldmann, and R. Sommer. Building a time machine for eficient recording and retrieval of high-volume network trafic. In ACM Internet Measurement Conference (IMC), 2005.
-
(2005)
ACM Internet Measurement Conference (IMC)
-
-
Kornexl, S.1
Paxson, V.2
Dreger, H.3
Feldmann, A.4
Sommer, R.5
-
21
-
-
24944532382
-
NOVOMODO: Scalable certificate validation and simplified PKI management
-
S. Micali. NOVOMODO: Scalable certificate validation and simplified PKI management. In PKI Research Workshop, 2002.
-
(2002)
PKI Research Workshop
-
-
Micali, S.1
-
25
-
-
84877789070
-
The laws of vulnerabilities
-
T. Ramos. The laws of vulnerabilities. In RSA Conference, 2006. http://www.qualys.com/docs/Laws-Presentation.pdf.
-
(2006)
RSA Conference
-
-
Ramos, T.1
-
28
-
-
0003615601
-
Can we eliminate certificate revocation lists?
-
R. L. Rivest. Can we eliminate certificate revocation lists? In Financial Cryptography (FC), 1998.
-
(1998)
Financial Cryptography (FC)
-
-
Rivest, R.L.1
-
29
-
-
84902299263
-
-
June, IETF RFC-6960
-
S. Santesson, M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP, June 2013. IETF RFC-6960.
-
(2013)
X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
-
-
Santesson, S.1
Myers, M.2
Ankney, R.3
Malpani, A.4
Galperin, S.5
Adams, C.6
-
34
-
-
84910609642
-
Toward short-lived certificates
-
E. Topalovic, B. Saeta, L.-S. Huang, C. Jackson, and D. Boneh. Toward short-lived certificates. In Web 2.0 Security & Privacy (W2SP), 2012.
-
(2012)
Web 2.0 Security & Privacy (W2SP)
-
-
Topalovic, E.1
Saeta, B.2
Huang, L.-S.3
Jackson, C.4
Boneh, D.5
-
35
-
-
84877725095
-
When private keys are public: Results from the 2008 debian OpenSSL vulnerability
-
S. Yilek, E. Rescorla, H. Shacham, B. Enright, and S. Savage. When private keys are public: Results from the 2008 Debian OpenSSL vulnerability. In ACM Internet Measurement Conference (IMC), 2009.
-
(2009)
ACM Internet Measurement Conference (IMC)
-
-
Yilek, S.1
Rescorla, E.2
Shacham, H.3
Enright, B.4
Savage, S.5
|