Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper)
Open Access
- 1 January 2012
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- When private keys are publicPublished by Association for Computing Machinery (ACM) ,2009
- So long, and no thanks for the externalitiesPublished by Association for Computing Machinery (ACM) ,2009
- DoubleCheck: Multi-path verification against man-in-the-middle attacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA CertificateLecture Notes in Computer Science, 2009
- Two Years of Broken Crypto: Debian's Dress Rehearsal for a Global PKI CompromiseIEEE Security & Privacy, 2008
- Security and identification indicators for browsers against spoofing and phishing attacksACM Transactions on Internet Technology, 2008
- Low probability, high impact: Policy making and extreme eventsJournal of Policy Modeling, 2008
- Weak Authentication: How to Authenticate Unknown Principals without Trusted PartiesLecture Notes in Computer Science, 2004
- The Resurrecting Duckling: Security Issues for Ad-hoc Wireless NetworksLecture Notes in Computer Science, 2000
- A certification scheme for electronic commerceLecture Notes in Computer Science, 1997