A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies

S Khan, F Luo, Z Zhang, F Ullah, F Amin… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …

Let's Encrypt: an automated certificate authority to encrypt the entire web

J Aas, R Barnes, B Case, Z Durumeric… - Proceedings of the …, 2019 - dl.acm.org
Let's Encrypt is a free, open, and automated HTTPS certificate authority (CA) created to
advance HTTPS adoption to the entire Web. Since its launch in late 2015, Let's Encrypt has …

An identity management and authentication scheme based on redactable blockchain for mobile networks

J Xu, K Xue, H Tian, J Hong, DSL Wei… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
More and more users are eager to obtain more comprehensive network services without
revealing their private information. Traditionally, in order to access a network, a user is …

Blockchain-based certificate transparency and revocation transparency

Z Wang, J Lin, Q Cai, Q Wang, D Zha… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Traditional X. 509 public key infrastructures (PKIs) depend on trusted certification authorities
(CAs) to sign certificates, used in SSL/TLS to authenticate web servers and establish secure …

An end-to-end measurement of certificate revocation in the web's PKI

Y Liu, W Tome, L Zhang, D Choffnes, D Levin… - Proceedings of the …, 2015 - dl.acm.org
Critical to the security of any public key infrastructure (PKI) is the ability to revoke previously
issued certificates. While the overall SSL ecosystem is well-studied, the frequency with …

Coming of age: A longitudinal study of tls deployment

P Kotzias, A Razaghpanah, J Amann… - Proceedings of the …, 2018 - dl.acm.org
The Transport Layer Security (TLS) protocol is the de-facto standard for encrypted
communication on the Internet. However, it has been plagued by a number of different …

With great training comes great vulnerability: Practical attacks against transfer learning

B Wang, Y Yao, B Viswanath, H Zheng… - 27th USENIX security …, 2018 - usenix.org
Transfer learning is a powerful approach that allows users to quickly build accurate deep-
learning (Student) models by" learning" from centralized (Teacher) models pretrained with …

{Light-Weight} Contexts: An {OS} Abstraction for Safety and Performance

J Litton, A Vahldiek-Oberwagner, E Elnikety… - … USENIX Symposium on …, 2016 - usenix.org
We introduce a new OS abstraction—light-weight contexts (lwCs)—that provides
independent units of protection, privilege, and execution state within a process. A process …

Mission accomplished? HTTPS security after DigiNotar

J Amann, O Gasser, Q Scheitle, L Brent… - Proceedings of the …, 2017 - dl.acm.org
Driven by CA compromises and the risk of man-in-the-middle attacks, new security features
have been added to TLS, HTTPS, and the web PKI over the past five years. These include …

Studying TLS usage in Android apps

A Razaghpanah, AA Niaki… - Proceedings of the 13th …, 2017 - dl.acm.org
Transport Layer Security (TLS), has become the de-facto standard for secure Internet
communication. When used correctly, it provides secure data transfer, but used incorrectly, it …