-
1
-
-
84865486272
-
Public keys
-
A. K. Lenstra, J. P. Hughes, M. Augier, J. W. Bos, T. Kleinjung, and C. Wachter, “Public keys,” in CRYPTO’12, 2012, pp. 626–642.
-
(2012)
CRYPTO’12
, pp. 626-642
-
-
Lenstra, A. K.1
Hughes, J. P.2
Augier, M.3
Bos, J. W.4
Kleinjung, T.5
Wachter, C.6
-
3
-
-
84888097037
-
-
N. J. AlFardan, D. J. Bernstein, K. G. Paterson, B. Poettering, and J. C. Schuldt, “On the security of RC4 in TLS and WPA,” 2013.
-
(2013)
On the security of RC4 in TLS and WPA
-
-
AlFardan, N. J.1
Bernstein, D. J.2
Paterson, K. G.3
Poettering, B.4
Schuldt, J. C.5
-
4
-
-
84893080221
-
Iranian hackers obtain fraudulent HTTPS certificates: How close to a web security meltdown did we get?
-
[Online]. Available
-
P. Eckersley, “Iranian hackers obtain fraudulent HTTPS certificates: How close to a web security meltdown did we get?” Electronic Frontier Foundation, 2011. [Online]. Available: https://www.eff.org/deeplinks/2011/03/iranian-hackers-obtain-fraudulent-https
-
(2011)
Electronic Frontier Foundation
-
-
Eckersley, P.1
-
5
-
-
85016017125
-
Trustwave admits crafting SSL snooping certificate: Allowing bosses to spy on staff was wrong, says security biz
-
[Online]. Available
-
J. Leyden, “Trustwave admits crafting SSL snooping certificate: Allowing bosses to spy on staff was wrong, says security biz,” The Register, 2012. [Online]. Available: www.theregister.co.uk/2012/02/09/ tustwave_disavows_mitm_digital_cert
-
(2012)
The Register
-
-
Leyden, J.1
-
7
-
-
85016018802
-
Phony SSL certificates issued for Google, Yahoo, Skype, others
-
March
-
P. Roberts, “Phony SSL certificates issued for Google, Yahoo, Skype, others,” Threat Post, March 2011, threatpost.com/phony-ssl-certificates-issued-googleyahoo-skype-others-032311.
-
(2011)
Threat Post
-
-
Roberts, P.1
-
8
-
-
85016066455
-
Second firm warns of concern after dutch hack
-
September [Online]. Available
-
T. Sterling, “Second firm warns of concern after dutch hack,” Yahoo! News, September 2011. [Online]. Available: http://news.yahoo.com/second-firm-warns-concern-dutch-hack-215940770.html
-
(2011)
Yahoo! News
-
-
Sterling, T.1
-
10
-
-
82955228604
-
Detecting certificate authority compromises and web browser collusion
-
J. Appelbaum, “Detecting certificate authority compromises and web browser collusion,” Tor Blog, 2011.
-
(2011)
Tor Blog
-
-
Appelbaum, J.1
-
11
-
-
85180624159
-
Black tulip report of the investigation into the diginotar certificate authority breach
-
“Black tulip report of the investigation into the diginotar certificate authority breach,” Fox-IT (Tech. Report), 2012.
-
(2012)
Fox-IT (Tech. Report)
-
-
-
12
-
-
84869161501
-
Rogue web certificate could have been used to attack iran dissidents
-
C. Arthur, “Rogue web certificate could have been used to attack iran dissidents,” The Guardian, 2011.
-
(2011)
The Guardian
-
-
Arthur, C.1
-
13
-
-
84881218966
-
SSL and HTTPS:revisiting past challenges and evaluating certificate trust model enhancements
-
J. Clark and P. C. van Oorschot, “SSL and HTTPS:revisiting past challenges and evaluating certificate trust model enhancements,” in IEEE Symposium on Security and Privacy, 2013.
-
(2013)
IEEE Symposium on Security and Privacy
-
-
Clark, J.1
van Oorschot, P. C.2
-
15
-
-
84889000517
-
Trust assertions for certificate keys (TACK)
-
M. Marlinspike and T. Perrin, “Trust assertions for certificate keys (TACK),” Internet draft, 2012.
-
(2012)
Internet draft
-
-
Marlinspike, M.1
Perrin, T.2
-
16
-
-
85034040740
-
Perspectives: improving SSH-style host authentication with multi-path probing
-
D. Wendlandt, D. G. Andersen, and A. Perrig, “Perspectives: improving SSH-style host authentication with multi-path probing,” in USENIX Annual Technical Conference, 2008, pp. 321–334.
-
(2008)
USENIX Annual Technical Conference
, pp. 321-334
-
-
Wendlandt, D.1
Andersen, D. G.2
Perrig, A.3
-
18
-
-
70449482420
-
Doublecheck: Multipath verification against man-in-the-middle attacks
-
M. Alicherry and A. D. Keromytis, “Doublecheck: Multipath verification against man-in-the-middle attacks,” in ISCC, 2009, pp. 557–563.
-
(2009)
ISCC
, pp. 557-563
-
-
Alicherry, M.1
Keromytis, A. D.2
-
19
-
-
84881252268
-
-
Technical report, ICSI
-
B. Amann, M. Vallentin, S. Hall, and R. Sommer, “Revisiting SSL: A large-scale study of the internet’s most trusted protocol,” Technical report, ICSI, 2012.
-
(2012)
Revisiting SSL: A large-scale study of the internet’s most trusted protocol
-
-
Amann, B.1
Vallentin, M.2
Hall, S.3
Sommer, R.4
-
21
-
-
84958042111
-
Can we eliminate certificate revocation lists?
-
Springer
-
R. L. Rivest, “Can we eliminate certificate revocation lists?” in Financial Cryptography. Springer, 1998, pp. 178–183.
-
(1998)
Financial Cryptography
, pp. 178-183
-
-
Rivest, R. L.1
-
22
-
-
85016078591
-
Revocation checking and Chrome’s CRL
-
A. Langley, “Revocation checking and Chrome’s CRL,” ImperialViolet (blog), 2012.
-
(2012)
ImperialViolet (blog)
-
-
Langley, A.1
-
23
-
-
84893087821
-
Revocation transparency
-
September [Online]. Available
-
B. Laurie and E. Kasper, “Revocation transparency,” Google Research, September 2012. [Online]. Available: www.links.org/files/RevocationTransparency.pdf
-
(2012)
Google Research
-
-
Laurie, B.1
Kasper, E.2
-
25
-
-
84954112259
-
-
[Online]. Available
-
Certificate transparency. [Online]. Available: www.certificate-transparency.org
-
Certificate transparency
-
-
-
27
-
-
33847753565
-
The transport layer security (TLS) protocol version 1.2
-
Internet Engineering Task Force, Aug. updated by RFCs 5746, 5878, [Online]. Available
-
T. Dierks and E. Rescorla, “The transport layer security (TLS) protocol version 1.2,” RFC 5246 (Proposed Standard), Internet Engineering Task Force, Aug. 2008, updated by RFCs 5746, 5878, 6176. [Online]. Available: http://www.ietf.org/rfc/rfc5246.txt
-
(2008)
RFC 5246 (Proposed Standard)
, pp. 6176
-
-
Dierks, T.1
Rescorla, E.2
-
28
-
-
84870857598
-
Prohibiting secure sockets layer (SSL) version 2.0
-
Internet Engineering Task Force, Mar. [Online]. Available
-
S. Turner and T. Polk, “Prohibiting secure sockets layer (SSL) version 2.0,” RFC 6176 (Proposed Standard), Internet Engineering Task Force, Mar. 2011. [Online]. Available: http://www.ietf.org/rfc/rfc6176.txt
-
(2011)
RFC 6176 (Proposed Standard)
-
-
Turner, S.1
Polk, T.2
-
29
-
-
51049122345
-
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
-
Internet Engineering Task Force, May updated by RFC 6818. [Online]. Available
-
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk, “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile,” RFC 5280 (Proposed Standard), Internet Engineering Task Force, May 2008, updated by RFC 6818. [Online]. Available: http://www.ietf.org/rfc/rfc5280.txt
-
(2008)
RFC 5280 (Proposed Standard)
-
-
Cooper, D.1
Santesson, S.2
Farrell, S.3
Boeyen, S.4
Housley, R.5
Polk, W.6
-
30
-
-
34548273006
-
Gossip-based peer sampling
-
M. Jelasity, S. Voulgaris, R. Guerraoui, A.-M. Kermarrec, and M. Van Steen, “Gossip-based peer sampling,” ACM Transactions on Computer Systems (TOCS), vol. 25, no. 3, p. 8, 2007.
-
(2007)
ACM Transactions on Computer Systems (TOCS)
, vol.25
, Issue.3
, pp. 8
-
-
Jelasity, M.1
Voulgaris, S.2
Guerraoui, R.3
Kermarrec, A.-M.4
Van Steen, M.5
-
33
-
-
85034040740
-
Perspectives: improving SSH-style host authentication with multi-path probing
-
D. Wendlandt, D. G. Andersen, and A. Perrig, “Perspectives: improving SSH-style host authentication with multi-path probing,” in USENIX Annual Technical Conference, 2008, pp. 321–334.
-
(2008)
USENIX Annual Technical Conference
, pp. 321-334
-
-
Wendlandt, D.1
Andersen, D. G.2
Perrig, A.3
-
34
-
-
70449482420
-
Doublecheck: Multipath verification against man-in-the-middle attacks
-
M. Alicherry and A. D. Keromytis, “Doublecheck: Multipath verification against man-in-the-middle attacks,” in ISCC, 2009, pp. 557–563.
-
(2009)
ISCC
, pp. 557-563
-
-
Alicherry, M.1
Keromytis, A. D.2
-
35
-
-
84857080633
-
Certified lies: Detecting and defeating government interception attacks against SSL
-
C. Soghoian and S. Stamm, “Certified lies: Detecting and defeating government interception attacks against SSL,” in Financial Cryptography, 2011, pp. 250–259.
-
(2011)
Financial Cryptography
, pp. 250-259
-
-
Soghoian, C.1
Stamm, S.2
-
38
-
-
84881261997
-
The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA
-
Internet Engineering Task Force, Aug. [Online]. Available
-
P. Hoffman and J. Schlyter, “The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA,” RFC 6698 (Proposed Standard), Internet Engineering Task Force, Aug. 2012. [Online]. Available: http://www.ietf.org/rfc/rfc6698.txt
-
(2012)
RFC 6698 (Proposed Standard)
-
-
Hoffman, P.1
Schlyter, J.2
-
41
-
-
84888083218
-
Accountable key infrastructure (AKI): A proposal for a public-key validation infrastructure
-
T. H.-J. Kim, L.-S. Huang, A. Perrig, C. Jackson, and V. Gligor, “Accountable key infrastructure (AKI): A proposal for a public-key validation infrastructure,” in 22nd International World Wide Web Conference, 2013.
-
(2013)
22nd International World Wide Web Conference
-
-
Kim, T. H.-J.1
Huang, L.-S.2
Perrig, A.3
Jackson, C.4
Gligor, V.5
-
42
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, “Identity-based cryptosystems and signature schemes,” in CRYPTO, 1984, pp. 47–53.
-
(1984)
CRYPTO
, pp. 47-53
-
-
Shamir, A.1
-
43
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. K. Franklin, “Identity-based encryption from the weil pairing,” in CRYPTO, 2001, pp. 213–229.
-
(2001)
CRYPTO
, pp. 213-229
-
-
Boneh, D.1
Franklin, M. K.2
-
44
-
-
0345490607
-
Certificateless public key cryptography
-
S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” in ASIACRYPT, 2003, pp. 452–473.
-
(2003)
ASIACRYPT
, pp. 452-473
-
-
Al-Riyami, S. S.1
Paterson, K. G.2
-
45
-
-
84883079764
-
Confused Johnny: when automatic encryption leads to confusion and mistakes
-
L. Bauer, K. Beznosov, and L. F. Cranor, Eds. ACM
-
S. Ruoti, N. Kim, B. Burgon, T. W. van der Horst, and K. E. Seamons, “Confused Johnny: when automatic encryption leads to confusion and mistakes,” in SOUPS, L. Bauer, K. Beznosov, and L. F. Cranor, Eds. ACM, 2013, p. 5.
-
(2013)
SOUPS
, pp. 5
-
-
Ruoti, S.1
Kim, N.2
Burgon, B.3
van der Horst, T. W.4
Seamons, K. E.5
-
47
-
-
84859355144
-
Privacy supporting cloud computing: Confichair, a case study
-
Springer
-
M. Arapinis, S. Bursuc, and M. Ryan, “Privacy supporting cloud computing: Confichair, a case study,” in Principles of Security and Trust. Springer, 2012, pp. 89–108.
-
(2012)
Principles of Security and Trust
, pp. 89-108
-
-
Arapinis, M.1
Bursuc, S.2
Ryan, M.3
-
49
-
-
38049082907
-
Security against covert adversaries: Efficient protocols for realistic adversaries
-
Springer
-
Y. Aumann and Y. Lindell, “Security against covert adversaries: Efficient protocols for realistic adversaries,” in Theory of Cryptography. Springer, 2007, pp. 137–156.
-
(2007)
Theory of Cryptography
, pp. 137-156
-
-
Aumann, Y.1
Lindell, Y.2
-
50
-
-
78049415470
-
Election verifiability in electronic voting protocols
-
S. Kremer, M. Ryan, and B. Smyth, “Election verifiability in electronic voting protocols,” in ESORICS, 2010, pp. 389–404.
-
(2010)
ESORICS
, pp. 389-404
-
-
Kremer, S.1
Ryan, M.2
Smyth, B.3
-
51
-
-
84867441806
-
Trivitas: Voters directly verifying votes
-
S. Bursuc, G. S. Grewal, and M. D. Ryan, “Trivitas: Voters directly verifying votes,” in VOTE-ID, 2011, pp. 190–207.
-
(2011)
VOTE-ID
, pp. 190-207
-
-
Bursuc, S.1
Grewal, G. S.2
Ryan, M. D.3
-
52
-
-
84881223064
-
Caveat coercitor: Coercion-evidence in electronic voting
-
G. S. Grewal, M. D. Ryan, S. Bursuc, and P. Y. A. Ryan, “Caveat coercitor: Coercion-evidence in electronic voting,” in IEEE Symposium on Security and Privacy, 2013, pp. 367–381.
-
(2013)
IEEE Symposium on Security and Privacy
, pp. 367-381
-
-
Grewal, G. S.1
Ryan, M. D.2
Bursuc, S.3
Ryan, P. Y. A.4
|