A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …
Let's Encrypt: an automated certificate authority to encrypt the entire web
J Aas, R Barnes, B Case, Z Durumeric… - Proceedings of the …, 2019 - dl.acm.org
Let's Encrypt is a free, open, and automated HTTPS certificate authority (CA) created to
advance HTTPS adoption to the entire Web. Since its launch in late 2015, Let's Encrypt has …
advance HTTPS adoption to the entire Web. Since its launch in late 2015, Let's Encrypt has …
An identity management and authentication scheme based on redactable blockchain for mobile networks
More and more users are eager to obtain more comprehensive network services without
revealing their private information. Traditionally, in order to access a network, a user is …
revealing their private information. Traditionally, in order to access a network, a user is …
Blockchain-based certificate transparency and revocation transparency
Traditional X. 509 public key infrastructures (PKIs) depend on trusted certification authorities
(CAs) to sign certificates, used in SSL/TLS to authenticate web servers and establish secure …
(CAs) to sign certificates, used in SSL/TLS to authenticate web servers and establish secure …
An end-to-end measurement of certificate revocation in the web's PKI
Critical to the security of any public key infrastructure (PKI) is the ability to revoke previously
issued certificates. While the overall SSL ecosystem is well-studied, the frequency with …
issued certificates. While the overall SSL ecosystem is well-studied, the frequency with …
Coming of age: A longitudinal study of tls deployment
P Kotzias, A Razaghpanah, J Amann… - Proceedings of the …, 2018 - dl.acm.org
The Transport Layer Security (TLS) protocol is the de-facto standard for encrypted
communication on the Internet. However, it has been plagued by a number of different …
communication on the Internet. However, it has been plagued by a number of different …
With great training comes great vulnerability: Practical attacks against transfer learning
Transfer learning is a powerful approach that allows users to quickly build accurate deep-
learning (Student) models by" learning" from centralized (Teacher) models pretrained with …
learning (Student) models by" learning" from centralized (Teacher) models pretrained with …
{Light-Weight} Contexts: An {OS} Abstraction for Safety and Performance
We introduce a new OS abstraction—light-weight contexts (lwCs)—that provides
independent units of protection, privilege, and execution state within a process. A process …
independent units of protection, privilege, and execution state within a process. A process …
Mission accomplished? HTTPS security after DigiNotar
Driven by CA compromises and the risk of man-in-the-middle attacks, new security features
have been added to TLS, HTTPS, and the web PKI over the past five years. These include …
have been added to TLS, HTTPS, and the web PKI over the past five years. These include …
Studying TLS usage in Android apps
A Razaghpanah, AA Niaki… - Proceedings of the 13th …, 2017 - dl.acm.org
Transport Layer Security (TLS), has become the de-facto standard for secure Internet
communication. When used correctly, it provides secure data transfer, but used incorrectly, it …
communication. When used correctly, it provides secure data transfer, but used incorrectly, it …