Creating a secure connection on the Internet is made possible through the usage of certificates, binding an entity to its public key. These certificates can be issued by any of the Certificate Authorities (CA), where each CA has the same privileges. During the last year, we have seen many CA compromises, resulting into the issuance of fraudulent certificates. Fraudulent certificates can be used, in combination with the man-in-the-middle attack, to eavesdrop the communications of Internet users. This research focuses on solutions that can remove or limit the impact of a CA compromisation and provides a description and analysis of each solution. The solutions have been chosen through interviews and literature. Among the discussed solutions a...
Digital certificates issued by certification authorities (CAs) which are part of the Web Public Key...
Abstract. The steadily growing number of certification authorities (CAs) assigned to the Web Public ...
Public Key Infrastructure (PKI) has turned out to be useful when two parties negotiate about a share...
The Web public-key infrastructure (PKI) provides a mechanism to identify websites to end users for t...
The security of the Public Key Infrastructure has been reevaluated in response to Certification Auth...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
Recent trends in public-key infrastructure research explore the tradeoff between decreased trust in ...
The Internet has opened new ways of communication between individuals, organisations and businesses....
International audienceA string of recent attacks against the global publickey infrastructure (PKI) h...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
Secure connections on the Internet are crucial to many ap-plications. Nowadays infrastructure for se...
© 2015 ACM. Certificate Authority (CA) is a single point of failure in the design of Public Key Infr...
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propaga...
The current Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is based on a weakest-lin...
The modern digital internet economy and billions of dollars of trade are made possible by the intern...
Digital certificates issued by certification authorities (CAs) which are part of the Web Public Key...
Abstract. The steadily growing number of certification authorities (CAs) assigned to the Web Public ...
Public Key Infrastructure (PKI) has turned out to be useful when two parties negotiate about a share...
The Web public-key infrastructure (PKI) provides a mechanism to identify websites to end users for t...
The security of the Public Key Infrastructure has been reevaluated in response to Certification Auth...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
Recent trends in public-key infrastructure research explore the tradeoff between decreased trust in ...
The Internet has opened new ways of communication between individuals, organisations and businesses....
International audienceA string of recent attacks against the global publickey infrastructure (PKI) h...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
Secure connections on the Internet are crucial to many ap-plications. Nowadays infrastructure for se...
© 2015 ACM. Certificate Authority (CA) is a single point of failure in the design of Public Key Infr...
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propaga...
The current Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is based on a weakest-lin...
The modern digital internet economy and billions of dollars of trade are made possible by the intern...
Digital certificates issued by certification authorities (CAs) which are part of the Web Public Key...
Abstract. The steadily growing number of certification authorities (CAs) assigned to the Web Public ...
Public Key Infrastructure (PKI) has turned out to be useful when two parties negotiate about a share...