The internet is one of the most widely used mediums for communication in modern society and it has become an everyday necessity for many. It is therefore of utmost importance that it remains as secure as possible. SSL and TLS are the backbones of internet security and an integral part of these technologies are the certificates used. Certificate authorities (CAs) can issue certificates that validate that domains are who they claim to be. If a user trusts a CA they can in turn also trust domains that have been validated by them. CAs can in turn trust other CAs and this, in turn, creates a chain of trust called a certificate chain. In this thesis, the structure of these certificate chains is analysed and a longitudinal dataset is created. The ...
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, Institute for Data, Sy...
HTTPS (HTTP over TLS) protocol provides message integrity, confidentiality, and server authenticati...
In this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore the i...
Certificate validation is today a vital part of keeping communication secure over the internet. It a...
The purpose of this study was to investigate how the Digital Certificate managementactors of the Pub...
Certificate Authorities (CAs) carry a huge responsibility in today's internet security landscape as ...
Certificates are the foundation of secure communication over the internet as of today. While certifi...
Many of today’s web-based services rely heavily on secure end-to-end connections. The “trust” that t...
We report the results of a large-scale measurement study of the HTTPS certificate ecosystem—the publ...
The X.509 landscape is one of the cornerstones of the internet today. It is used to establish trust ...
Um Webserver-Zertifikate auditierbar zu machen, erweitert Certficate Transparency (CT) das TLS-Ökosy...
There are several different methods for checking whether certificates on the web have been revoked, ...
The SSL and TLS infrastructure used in important protocols like HTTPs and IMAPs is built on an X.509...
The focus of this thesis is to analyze cryptographic protocol and algorithm usage based on three dif...
Much of the Internet’s end-to-end security relies on the SSL/TLS protocol along with its underlying ...
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, Institute for Data, Sy...
HTTPS (HTTP over TLS) protocol provides message integrity, confidentiality, and server authenticati...
In this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore the i...
Certificate validation is today a vital part of keeping communication secure over the internet. It a...
The purpose of this study was to investigate how the Digital Certificate managementactors of the Pub...
Certificate Authorities (CAs) carry a huge responsibility in today's internet security landscape as ...
Certificates are the foundation of secure communication over the internet as of today. While certifi...
Many of today’s web-based services rely heavily on secure end-to-end connections. The “trust” that t...
We report the results of a large-scale measurement study of the HTTPS certificate ecosystem—the publ...
The X.509 landscape is one of the cornerstones of the internet today. It is used to establish trust ...
Um Webserver-Zertifikate auditierbar zu machen, erweitert Certficate Transparency (CT) das TLS-Ökosy...
There are several different methods for checking whether certificates on the web have been revoked, ...
The SSL and TLS infrastructure used in important protocols like HTTPs and IMAPs is built on an X.509...
The focus of this thesis is to analyze cryptographic protocol and algorithm usage based on three dif...
Much of the Internet’s end-to-end security relies on the SSL/TLS protocol along with its underlying ...
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, Institute for Data, Sy...
HTTPS (HTTP over TLS) protocol provides message integrity, confidentiality, and server authenticati...
In this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore the i...