A First Look at the CT Landscape: Certificate Transparency Logs in Practice
- 17 February 2017
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 16 references indexed in Scilit:
- An End-to-End Measurement of Certificate Revocation in the Web's PKIPublished by Association for Computing Machinery (ACM) ,2015
- Imperfect Forward SecrecyPublished by Association for Computing Machinery (ACM) ,2015
- Efficient gossip protocols for verifying the consistency of Certificate logsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating SystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- ARPKIPublished by Association for Computing Machinery (ACM) ,2014
- Analyzing Forged SSL Certificates in the WildPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- No attack necessaryPublished by Association for Computing Machinery (ACM) ,2013
- Analysis of the HTTPS certificate ecosystemPublished by Association for Computing Machinery (ACM) ,2013
- Accountable key infrastructure (AKI)Published by Association for Computing Machinery (ACM) ,2013
- Here's my cert, so trust me, maybe?Published by Association for Computing Machinery (ACM) ,2013