메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Enhanced Certificate Transparency and End-to-end Encrypted Mail

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; PEER TO PEER NETWORKS;

EID: 84910599476     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss/2014.23379     Document Type: Conference Paper
Times cited : (130)

References (52)
  • 4
    • 84893080221 scopus 로고    scopus 로고
    • Iranian hackers obtain fraudulent HTTPS certificates: How close to a web security meltdown did we get?
    • [Online]. Available
    • P. Eckersley, “Iranian hackers obtain fraudulent HTTPS certificates: How close to a web security meltdown did we get?” Electronic Frontier Foundation, 2011. [Online]. Available: https://www.eff.org/deeplinks/2011/03/iranian-hackers-obtain-fraudulent-https
    • (2011) Electronic Frontier Foundation
    • Eckersley, P.1
  • 5
    • 85016017125 scopus 로고    scopus 로고
    • Trustwave admits crafting SSL snooping certificate: Allowing bosses to spy on staff was wrong, says security biz
    • [Online]. Available
    • J. Leyden, “Trustwave admits crafting SSL snooping certificate: Allowing bosses to spy on staff was wrong, says security biz,” The Register, 2012. [Online]. Available: www.theregister.co.uk/2012/02/09/ tustwave_disavows_mitm_digital_cert
    • (2012) The Register
    • Leyden, J.1
  • 7
    • 85016018802 scopus 로고    scopus 로고
    • Phony SSL certificates issued for Google, Yahoo, Skype, others
    • March
    • P. Roberts, “Phony SSL certificates issued for Google, Yahoo, Skype, others,” Threat Post, March 2011, threatpost.com/phony-ssl-certificates-issued-googleyahoo-skype-others-032311.
    • (2011) Threat Post
    • Roberts, P.1
  • 8
    • 85016066455 scopus 로고    scopus 로고
    • Second firm warns of concern after dutch hack
    • September [Online]. Available
    • T. Sterling, “Second firm warns of concern after dutch hack,” Yahoo! News, September 2011. [Online]. Available: http://news.yahoo.com/second-firm-warns-concern-dutch-hack-215940770.html
    • (2011) Yahoo! News
    • Sterling, T.1
  • 10
    • 82955228604 scopus 로고    scopus 로고
    • Detecting certificate authority compromises and web browser collusion
    • J. Appelbaum, “Detecting certificate authority compromises and web browser collusion,” Tor Blog, 2011.
    • (2011) Tor Blog
    • Appelbaum, J.1
  • 11
    • 85180624159 scopus 로고    scopus 로고
    • Black tulip report of the investigation into the diginotar certificate authority breach
    • “Black tulip report of the investigation into the diginotar certificate authority breach,” Fox-IT (Tech. Report), 2012.
    • (2012) Fox-IT (Tech. Report)
  • 12
    • 84869161501 scopus 로고    scopus 로고
    • Rogue web certificate could have been used to attack iran dissidents
    • C. Arthur, “Rogue web certificate could have been used to attack iran dissidents,” The Guardian, 2011.
    • (2011) The Guardian
    • Arthur, C.1
  • 13
    • 84881218966 scopus 로고    scopus 로고
    • SSL and HTTPS:revisiting past challenges and evaluating certificate trust model enhancements
    • J. Clark and P. C. van Oorschot, “SSL and HTTPS:revisiting past challenges and evaluating certificate trust model enhancements,” in IEEE Symposium on Security and Privacy, 2013.
    • (2013) IEEE Symposium on Security and Privacy
    • Clark, J.1    van Oorschot, P. C.2
  • 15
    • 84889000517 scopus 로고    scopus 로고
    • Trust assertions for certificate keys (TACK)
    • M. Marlinspike and T. Perrin, “Trust assertions for certificate keys (TACK),” Internet draft, 2012.
    • (2012) Internet draft
    • Marlinspike, M.1    Perrin, T.2
  • 16
    • 85034040740 scopus 로고    scopus 로고
    • Perspectives: improving SSH-style host authentication with multi-path probing
    • D. Wendlandt, D. G. Andersen, and A. Perrig, “Perspectives: improving SSH-style host authentication with multi-path probing,” in USENIX Annual Technical Conference, 2008, pp. 321–334.
    • (2008) USENIX Annual Technical Conference , pp. 321-334
    • Wendlandt, D.1    Andersen, D. G.2    Perrig, A.3
  • 18
    • 70449482420 scopus 로고    scopus 로고
    • Doublecheck: Multipath verification against man-in-the-middle attacks
    • M. Alicherry and A. D. Keromytis, “Doublecheck: Multipath verification against man-in-the-middle attacks,” in ISCC, 2009, pp. 557–563.
    • (2009) ISCC , pp. 557-563
    • Alicherry, M.1    Keromytis, A. D.2
  • 21
    • 84958042111 scopus 로고    scopus 로고
    • Can we eliminate certificate revocation lists?
    • Springer
    • R. L. Rivest, “Can we eliminate certificate revocation lists?” in Financial Cryptography. Springer, 1998, pp. 178–183.
    • (1998) Financial Cryptography , pp. 178-183
    • Rivest, R. L.1
  • 22
    • 85016078591 scopus 로고    scopus 로고
    • Revocation checking and Chrome’s CRL
    • A. Langley, “Revocation checking and Chrome’s CRL,” ImperialViolet (blog), 2012.
    • (2012) ImperialViolet (blog)
    • Langley, A.1
  • 23
    • 84893087821 scopus 로고    scopus 로고
    • Revocation transparency
    • September [Online]. Available
    • B. Laurie and E. Kasper, “Revocation transparency,” Google Research, September 2012. [Online]. Available: www.links.org/files/RevocationTransparency.pdf
    • (2012) Google Research
    • Laurie, B.1    Kasper, E.2
  • 25
    • 84954112259 scopus 로고    scopus 로고
    • [Online]. Available
    • Certificate transparency. [Online]. Available: www.certificate-transparency.org
    • Certificate transparency
  • 27
    • 33847753565 scopus 로고    scopus 로고
    • The transport layer security (TLS) protocol version 1.2
    • Internet Engineering Task Force, Aug. updated by RFCs 5746, 5878, [Online]. Available
    • T. Dierks and E. Rescorla, “The transport layer security (TLS) protocol version 1.2,” RFC 5246 (Proposed Standard), Internet Engineering Task Force, Aug. 2008, updated by RFCs 5746, 5878, 6176. [Online]. Available: http://www.ietf.org/rfc/rfc5246.txt
    • (2008) RFC 5246 (Proposed Standard) , pp. 6176
    • Dierks, T.1    Rescorla, E.2
  • 28
    • 84870857598 scopus 로고    scopus 로고
    • Prohibiting secure sockets layer (SSL) version 2.0
    • Internet Engineering Task Force, Mar. [Online]. Available
    • S. Turner and T. Polk, “Prohibiting secure sockets layer (SSL) version 2.0,” RFC 6176 (Proposed Standard), Internet Engineering Task Force, Mar. 2011. [Online]. Available: http://www.ietf.org/rfc/rfc6176.txt
    • (2011) RFC 6176 (Proposed Standard)
    • Turner, S.1    Polk, T.2
  • 29
    • 51049122345 scopus 로고    scopus 로고
    • Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
    • Internet Engineering Task Force, May updated by RFC 6818. [Online]. Available
    • D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk, “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile,” RFC 5280 (Proposed Standard), Internet Engineering Task Force, May 2008, updated by RFC 6818. [Online]. Available: http://www.ietf.org/rfc/rfc5280.txt
    • (2008) RFC 5280 (Proposed Standard)
    • Cooper, D.1    Santesson, S.2    Farrell, S.3    Boeyen, S.4    Housley, R.5    Polk, W.6
  • 33
    • 85034040740 scopus 로고    scopus 로고
    • Perspectives: improving SSH-style host authentication with multi-path probing
    • D. Wendlandt, D. G. Andersen, and A. Perrig, “Perspectives: improving SSH-style host authentication with multi-path probing,” in USENIX Annual Technical Conference, 2008, pp. 321–334.
    • (2008) USENIX Annual Technical Conference , pp. 321-334
    • Wendlandt, D.1    Andersen, D. G.2    Perrig, A.3
  • 34
    • 70449482420 scopus 로고    scopus 로고
    • Doublecheck: Multipath verification against man-in-the-middle attacks
    • M. Alicherry and A. D. Keromytis, “Doublecheck: Multipath verification against man-in-the-middle attacks,” in ISCC, 2009, pp. 557–563.
    • (2009) ISCC , pp. 557-563
    • Alicherry, M.1    Keromytis, A. D.2
  • 35
    • 84857080633 scopus 로고    scopus 로고
    • Certified lies: Detecting and defeating government interception attacks against SSL
    • C. Soghoian and S. Stamm, “Certified lies: Detecting and defeating government interception attacks against SSL,” in Financial Cryptography, 2011, pp. 250–259.
    • (2011) Financial Cryptography , pp. 250-259
    • Soghoian, C.1    Stamm, S.2
  • 38
    • 84881261997 scopus 로고    scopus 로고
    • The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA
    • Internet Engineering Task Force, Aug. [Online]. Available
    • P. Hoffman and J. Schlyter, “The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA,” RFC 6698 (Proposed Standard), Internet Engineering Task Force, Aug. 2012. [Online]. Available: http://www.ietf.org/rfc/rfc6698.txt
    • (2012) RFC 6698 (Proposed Standard)
    • Hoffman, P.1    Schlyter, J.2
  • 39
    • 84890036010 scopus 로고    scopus 로고
    • CAge: Taming certificate authorities by inferring restricted scopes
    • J. Kasten, E. Wustrow, and J. A. Halderman, “CAge: Taming certificate authorities by inferring restricted scopes,” in Financial Cryptography, 2013.
    • (2013) Financial Cryptography
    • Kasten, J.1    Wustrow, E.2    Halderman, J. A.3
  • 42
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir, “Identity-based cryptosystems and signature schemes,” in CRYPTO, 1984, pp. 47–53.
    • (1984) CRYPTO , pp. 47-53
    • Shamir, A.1
  • 43
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. K. Franklin, “Identity-based encryption from the weil pairing,” in CRYPTO, 2001, pp. 213–229.
    • (2001) CRYPTO , pp. 213-229
    • Boneh, D.1    Franklin, M. K.2
  • 44
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” in ASIACRYPT, 2003, pp. 452–473.
    • (2003) ASIACRYPT , pp. 452-473
    • Al-Riyami, S. S.1    Paterson, K. G.2
  • 45
    • 84883079764 scopus 로고    scopus 로고
    • Confused Johnny: when automatic encryption leads to confusion and mistakes
    • L. Bauer, K. Beznosov, and L. F. Cranor, Eds. ACM
    • S. Ruoti, N. Kim, B. Burgon, T. W. van der Horst, and K. E. Seamons, “Confused Johnny: when automatic encryption leads to confusion and mistakes,” in SOUPS, L. Bauer, K. Beznosov, and L. F. Cranor, Eds. ACM, 2013, p. 5.
    • (2013) SOUPS , pp. 5
    • Ruoti, S.1    Kim, N.2    Burgon, B.3    van der Horst, T. W.4    Seamons, K. E.5
  • 47
    • 84859355144 scopus 로고    scopus 로고
    • Privacy supporting cloud computing: Confichair, a case study
    • Springer
    • M. Arapinis, S. Bursuc, and M. Ryan, “Privacy supporting cloud computing: Confichair, a case study,” in Principles of Security and Trust. Springer, 2012, pp. 89–108.
    • (2012) Principles of Security and Trust , pp. 89-108
    • Arapinis, M.1    Bursuc, S.2    Ryan, M.3
  • 49
    • 38049082907 scopus 로고    scopus 로고
    • Security against covert adversaries: Efficient protocols for realistic adversaries
    • Springer
    • Y. Aumann and Y. Lindell, “Security against covert adversaries: Efficient protocols for realistic adversaries,” in Theory of Cryptography. Springer, 2007, pp. 137–156.
    • (2007) Theory of Cryptography , pp. 137-156
    • Aumann, Y.1    Lindell, Y.2
  • 50
    • 78049415470 scopus 로고    scopus 로고
    • Election verifiability in electronic voting protocols
    • S. Kremer, M. Ryan, and B. Smyth, “Election verifiability in electronic voting protocols,” in ESORICS, 2010, pp. 389–404.
    • (2010) ESORICS , pp. 389-404
    • Kremer, S.1    Ryan, M.2    Smyth, B.3
  • 51
    • 84867441806 scopus 로고    scopus 로고
    • Trivitas: Voters directly verifying votes
    • S. Bursuc, G. S. Grewal, and M. D. Ryan, “Trivitas: Voters directly verifying votes,” in VOTE-ID, 2011, pp. 190–207.
    • (2011) VOTE-ID , pp. 190-207
    • Bursuc, S.1    Grewal, G. S.2    Ryan, M. D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.