메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Web PKI: Closing the Gap between Guidelines and Practices

Author keywords

[No Author keywords available]

Indexed keywords

WEB CRAWLER;

EID: 85048055531     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss/2014.23305     Document Type: Conference Paper
Times cited : (26)

References (37)
  • 1
    • 84901222202 scopus 로고    scopus 로고
    • Flame malware collision attack explained
    • Jun. [Online]. Available
    • J. Ness, “Flame malware collision attack explained,” Tech. Rep., Jun. 2012. [Online]. Available: http://blogs.technet.com/b/srd/archive/2012/06/06/more-informationabout-the-digital-certificates-used-to-sign-the-flame-malware.aspx
    • (2012) Tech. Rep
    • Ness, J.1
  • 5
    • 84954112259 scopus 로고    scopus 로고
    • Google, [Online]. Available
    • Google, “Certificate transparency.” [Online]. Available: https://sites.google.com/site/certificatetransparency/
    • Certificate transparency
  • 6
    • 85019197773 scopus 로고    scopus 로고
    • OWASP Foundation, [Online]. Available
    • OWASP Foundation, “Certificate and public key pinning.” [Online]. Available: https://www.owasp.org/index.php/Certificate_and_ Public_Key_Pinning
    • Certificate and public key pinning
  • 8
    • 85034040740 scopus 로고    scopus 로고
    • Perspectives: Improving SSH-style host authentication with multi-path probing
    • D. Wendlandt, D. G. Andersen, and A. Perrig, “Perspectives: Improving SSH-style host authentication with multi-path probing.” in USENIX Annual Technical Conference, 2008, pp. 321–334.
    • (2008) USENIX Annual Technical Conference , pp. 321-334
    • Wendlandt, D.1    Andersen, D. G.2    Perrig, A.3
  • 18
    • 84865521479 scopus 로고    scopus 로고
    • Electronic Frontier Foundation, “The EFF SSL Observatory,” https://www.eff.org/observatory, 2010.
    • (2010) The EFF SSL Observatory
  • 23
    • 85180625027 scopus 로고    scopus 로고
    • Microsoft Corporation. [Online]. Available
    • Microsoft Corporation. (2013) Root certificate program. [Online]. Available: http://technet.microsoft.com/en-us/library/cc751157.aspx
    • (2013) Root certificate program
  • 24
    • 85180628130 scopus 로고    scopus 로고
    • Mozilla Foundation. [Online]. Available
    • Mozilla Foundation. (2013) CA certificate policy. [Online]. Available: http://www.mozilla.org/projects/security/certs/policy/
    • (2013) CA certificate policy
  • 25
    • 85180631342 scopus 로고    scopus 로고
    • Canadian Institute of Chartered Accountants. (Jan) [Online]. Available
    • Canadian Institute of Chartered Accountants. (2013, Jan.) WebTrust for certification authorities. [Online]. Available: http://www.webtrust.org/homepage-documents/item72056.pdf
    • (2013) WebTrust for certification authorities
  • 26
    • 85180620691 scopus 로고    scopus 로고
    • European Telecommunications Standards Institute. (Nov) [Online]. Available
    • European Telecommunications Standards Institute. (2012, Nov.) Policy requirements for certification authorities issuing public key certificates, v2.3.1. [Online]. Available: http://www.etsi.org/deliver/etsi_ts/102000_ 102099/102042/02.03.01_60/ts_102042v020301p.pdf
    • (2012) Policy requirements for certification authorities issuing public key certificates, v2.3.1
  • 30
    • 85180629409 scopus 로고    scopus 로고
    • Alexa Internet Inc. [Online]. Available
    • Alexa Internet Inc. (2013) Top 1,000,000 sites (updated daily). [Online]. Available: http://s3.amazonaws.com/alexa-static/top-1m.csv.zip
    • (2013) Top 1,000,000 sites (updated daily)
  • 31
    • 84914168275 scopus 로고    scopus 로고
    • International Computer Science Institute. [Online]. Available
    • International Computer Science Institute. (2012) The ICSI certificate notary. [Online]. Available: http://notary.icsi.berkeley.edu/
    • (2012) The ICSI certificate notary
  • 33
    • 84874280209 scopus 로고    scopus 로고
    • Variants of Bleichenbacher’s low-exponent attack on PKCS#1 RSA signatures
    • A. Alkassar and J. H. Siekmann, Eds. GI
    • U. Kühn, A. Pyshkin, E. Tews, and R.-P. Weinmann, “Variants of Bleichenbacher’s low-exponent attack on PKCS#1 RSA signatures,” in Sicherheit, A. Alkassar and J. H. Siekmann, Eds. GI, 2008, pp. 97–109.
    • (2008) Sicherheit , pp. 97-109
    • Kühn, U.1    Pyshkin, A.2    Tews, E.3    Weinmann, R.-P.4
  • 34
    • 85180635639 scopus 로고    scopus 로고
    • OpenSSL. [Online]. Available
    • OpenSSL. (2013) Documentation of the X.509 API. [Online]. Available: http://www.openssl.org/docs/apps/x509.html
    • (2013) Documentation of the X.509 API
  • 35
    • 84890049522 scopus 로고    scopus 로고
    • [Online]. Available
    • N. Heninger. (2013) Factoring as a service. [Online]. Available: http://crypto.2013.rump.cr.yp.to/981774ce07e51813fd4466612a78601b.pdf
    • (2013) Factoring as a service
    • Heninger, N.1
  • 37
    • 70350346082 scopus 로고    scopus 로고
    • Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate
    • S. Halevi, Ed. Springer
    • M. Stevens, A. Sotirov, J. Appelbaum, A. K. Lenstra, D. Molnar, D. A. Osvik, and B. de Weger, “Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate,” in CRYPTO, S. Halevi, Ed. Springer, 2009, pp. 55–69.
    • (2009) CRYPTO , pp. 55-69
    • Stevens, M.1    Sotirov, A.2    Appelbaum, J.3    Lenstra, A. K.4    Molnar, D.5    Osvik, D. A.6    de Weger, B.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.