HTTPS is a cornerstone of privacy in the modern Web. The public key infrastructure underlying HTTPS, however, is a frequent target of attacks. In several cases, forged certificates have been issued by compromised Certificate Authorities (CA) and used to spy on users at large scale. While the concept of Certificate Transparency (CT) provides a means for detecting such forgeries, it builds on a distributed system of CT logs whose correctness is still insufficiently protected. By compromising a certificate authority and the corresponding log, a covert adversary can still issue rogue certificates unnoticed
Certificate Transparency provides auditability to the widely used X.509 Public Key Infrastructure (P...
<p>Recent trends in public-key infrastructure research explore the tradeoff between decreased trust ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Many of today’s web-based services rely heavily on secure end-to-end connections. The “trust” that t...
Many of today’s web-based services rely heavily on secure end-to-end connections. The “trust” that t...
Certificate transparency (CT) is a system that publishes all issued certificates so that they can be...
In this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore the i...
The security of the web improved greatly throughout the last couple of years. A large majority of th...
Security on the Internet is essential to ensure the privacy of an individual. Today, Trans- port Lay...
Security on the Internet is essential to ensure the privacy of an individual. Today, Trans- port Lay...
Abstract. The existing HTTPS public-key infrastructure (PKI) uses a coarse-grained trust model: eith...
Internet security and privacy stand on the trustworthiness of public certificates signed by Certific...
Creating a secure connection on the Internet is made possible through the usage of certificates, bin...
Internet security and privacy stand on the trustworthiness of public certificates signed by Certific...
Recent trends in public-key infrastructure research explore the tradeoff between decreased trust in ...
Certificate Transparency provides auditability to the widely used X.509 Public Key Infrastructure (P...
<p>Recent trends in public-key infrastructure research explore the tradeoff between decreased trust ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Many of today’s web-based services rely heavily on secure end-to-end connections. The “trust” that t...
Many of today’s web-based services rely heavily on secure end-to-end connections. The “trust” that t...
Certificate transparency (CT) is a system that publishes all issued certificates so that they can be...
In this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore the i...
The security of the web improved greatly throughout the last couple of years. A large majority of th...
Security on the Internet is essential to ensure the privacy of an individual. Today, Trans- port Lay...
Security on the Internet is essential to ensure the privacy of an individual. Today, Trans- port Lay...
Abstract. The existing HTTPS public-key infrastructure (PKI) uses a coarse-grained trust model: eith...
Internet security and privacy stand on the trustworthiness of public certificates signed by Certific...
Creating a secure connection on the Internet is made possible through the usage of certificates, bin...
Internet security and privacy stand on the trustworthiness of public certificates signed by Certific...
Recent trends in public-key infrastructure research explore the tradeoff between decreased trust in ...
Certificate Transparency provides auditability to the widely used X.509 Public Key Infrastructure (P...
<p>Recent trends in public-key infrastructure research explore the tradeoff between decreased trust ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...