-
2
-
-
84888009741
-
-
Convergence. http://convergence.io/.
-
Convergence
-
-
-
3
-
-
84893079923
-
-
May 2011
-
Public Key Pinning. http://www.imperialviolet. org/2011/05/04/pinning.html, May 2011.
-
Public Key Pinning
-
-
-
5
-
-
85092786374
-
Global authentication in an untrustworthy world
-
Petros Maniatis, editor USENIX Association
-
Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, and Yinglian Xie. Global authentication in an untrustworthy world. In Petros Maniatis, editor, HotOS. USENIX Association, 2013.
-
(2013)
HotOS
-
-
Abadi, M.1
Birrell, A.2
Mironov, I.3
Wobber, T.4
Xie, Y.5
-
6
-
-
84884478474
-
High-speed high-security signatures
-
Daniel J Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang. High-speed high-security signatures. Journal of Cryptographic Engineering, 2(2):77-89, 2012.
-
(2012)
Journal of Cryptographic Engineering
, vol.2
, Issue.2
, pp. 77-89
-
-
Bernstein, D.J.1
Duif, N.2
Lange, T.3
Schwabe, P.4
Yang, B.5
-
7
-
-
74049152241
-
Browser interfaces and extended validation SSL certificates: An empirical study
-
ACM
-
Robert Biddle, Paul C van Oorschot, Andrew S Patrick, Jennifer Sobey, and Tara Whalen. Browser interfaces and extended validation SSL certificates: an empirical study. In Proceedings of the 2009 ACM workshop on Cloud computing security, pages 19-30. ACM, 2009.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 19-30
-
-
Biddle, R.1
Van Oorschot, P.C.2
Patrick, A.S.3
Sobey, J.4
Whalen, T.5
-
8
-
-
79955893849
-
Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile
-
May
-
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280 (Proposed Standard), May 2008.
-
(2008)
RFC 5280 (Proposed Standard
-
-
Cooper, D.1
Santesson, S.2
Farrell, S.3
Boeyen, S.4
Housley, R.5
Polk, W.6
-
11
-
-
84869429339
-
The most dangerous code in the world: Validating SSL certificates in non-browser software
-
ACM
-
Martin Georgiev, Subodh Iyengar, Suman Jana, Rishita Anubhai, Dan Boneh, and Vitaly Shmatikov. The most dangerous code in the world: validating SSL certificates in non-browser software. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 38-49. ACM, 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 38-49
-
-
Georgiev, M.1
Iyengar, S.2
Jana, S.3
Anubhai, R.4
Boneh, D.5
Shmatikov, V.6
-
14
-
-
84861425935
-
Fast elliptic curve cryptography in OpenSSL
-
7126 of LNCS, Springer
-
Emilia Kasper. Fast elliptic curve cryptography in OpenSSL. In Financial Cryptography and Data Security, volume 7126 of LNCS, pages 27-39. Springer, 2012.
-
(2012)
Financial Cryptography and Data Security
, pp. 27-39
-
-
Kasper, E.1
-
15
-
-
84888083218
-
Accountable key infrastructure (Aki) a proposal for a public-key validation infrastructure
-
Daniel Schwabe, Virgílio A. F. Almeida, Hartmut Glaser, Ricardo A. Baeza-Yates, and Sue B. Moon, editors May 2013
-
Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perrig, Collin Jackson, and Virgil Gligor. Accountable Key Infrastructure (AKI): A Proposal for a Public-Key Validation Infrastructure. In Daniel Schwabe, Virgílio A. F. Almeida, Hartmut Glaser, Ricardo A. Baeza-Yates, and Sue B. Moon, editors, Proceedings of the International World Wide Web Conference (WWW), May 2013.
-
Proceedings of the International World Wide Web Conference WWW
-
-
Hyun-Jin Kim, T.1
Huang, L.2
Perrig, A.3
Jackson, C.4
Gligor, V.5
-
16
-
-
84937843276
-
-
June 2010
-
Adam Langley. Overclocking SSL. https://www.imperialviolet.org/2010/06/25/overclocking-ssl.html, June 2010.
-
Overclocking SSL
-
-
Langley, A.1
-
20
-
-
84881193419
-
The tamarin prover for the symbolic analysis of security protocols
-
Princeton, USA, Proc., 8044 of LNCS, Springer
-
Simon Meier, Benedikt Schmidt, Cas Cremers, and David Basin. The TAMARIN Prover for the Symbolic Analysis of Security Protocols. In Computer Aided Verification, 25th International Conference, CAV 2013, Princeton, USA, Proc., volume 8044 of LNCS, pages 696-701. Springer, 2013.
-
(2013)
Computer Aided Verification, 25th International Conference, CAV 2013
, pp. 696-701
-
-
Meier, S.1
Schmidt, B.2
Cremers, C.3
Basin, D.4
-
22
-
-
0003344055
-
X.509 internet public key infrastructure online certificate status protocol-ocsp
-
June
-
M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP. Internet Request for Comments 2560, June 1999.
-
(1999)
Internet Request for Comments 2560
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
24
-
-
84910599476
-
Enhanced certificate transparency and end-to-end encrypted mail
-
Mark D. Ryan. Enhanced certificate transparency and end-to-end encrypted mail. In Proceedings of NDSS. The Internet Society, 2014.
-
(2014)
Proceedings of NDSS. The Internet Society
-
-
Ryan, M.D.1
-
25
-
-
84866938883
-
Automated analysis of Diffie-Hellman protocols and advanced security properties
-
IEEE
-
Benedikt Schmidt, Simon Meier, Cas Cremers, and David Basin. Automated analysis of Diffie-Hellman protocols and advanced security properties. In Computer Security Foundations Symposium (CSF), pages 78-94. IEEE, 2012.
-
(2012)
Computer Security Foundations Symposium (CSF
, pp. 78-94
-
-
Schmidt, B.1
Meier, S.2
Cremers, C.3
Basin, D.4
-
28
-
-
84910683092
-
-
May 2012
-
Emin Topalovic, Brennan Saeta, Lin-Shung Huang, Collin Jackson, and Dan Boneh. Towards Short-Lived Certificates. In Web 2.0 Security and Privacy, May 2012.
-
Towards Short-Lived Certificates. Web 2.0 Security and Privacy
-
-
Topalovic, E.1
Saeta, B.2
Huang, L.3
Jackson, C.4
Boneh, D.5
|