Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web
暂无分享,去创建一个
[1] P. Alam. ‘A’ , 2021, Composites Engineering: An A–Z Guide.
[2] Roland Shoemaker,et al. ACME TLS ALPN Challenge Extension , 2019 .
[3] L. J. Camp,et al. A Complete Study of P.K.I. (PKI’s Known Incidents) , 2019, SSRN Electronic Journal.
[4] Torben Weis,et al. Domain Impersonation is Feasible: A Study of CA Domain Validation Vulnerabilities , 2019, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).
[5] Phillip M. Hallam-Baker,et al. DNS Certification Authority Authorization (CAA) Resource Record , 2019, RFC.
[6] Dan S. Wallach,et al. On the Usability of HTTPS Deployment , 2019, CHI.
[7] Richard Barnes,et al. Automatic Certificate Management Environment (ACME) , 2019, RFC.
[8] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.3 , 2018, RFC.
[9] Deepak Kumar,et al. Tracking Certificate Misissuance in the Wild , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[10] Adrienne Porter Felt,et al. Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors , 2017, CCS.
[11] Edgar R. Weippl,et al. "I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS , 2017, USENIX Security Symposium.
[12] Bruce M. Maggs,et al. CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[13] Karthikeyan Bhargavan,et al. Formal Modeling and Verification for Domain Validation and ACME , 2017, Financial Cryptography.
[14] J. Alex Halderman,et al. A Search Engine Backed by Internet-Wide Scanning , 2015, CCS.
[15] Matthew Green,et al. Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice , 2015, CCS.
[16] Alfredo Pironti,et al. A Messy State of the Union: Taming the Composite State Machines of TLS , 2015, 2015 IEEE Symposium on Security and Privacy.
[17] Vern Paxson,et al. Ad Injection at Scale: Assessing Deceptive Advertisement Modifications , 2015, 2015 IEEE Symposium on Security and Privacy.
[18] Narseo Vallina-Rodriguez,et al. A Tangled Mass: The Android Root Certificate Stores , 2014, CoNEXT.
[19] Vern Paxson,et al. The Matter of Heartbleed , 2014, Internet Measurement Conference.
[20] Tudor Dumitras,et al. Analysis of SSL certificate reissues and revocations in the wake of heartbleed , 2014, Internet Measurement Conference.
[21] Sean Turner,et al. Transport Layer Security , 2014, IEEE Internet Computing.
[22] Ben Laurie,et al. Certificate transparency , 2014, Commun. ACM.
[23] Adam Langley,et al. Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension , 2014, RFC.
[24] J. Alex Halderman,et al. Analysis of the HTTPS certificate ecosystem , 2013, Internet Measurement Conference.
[25] Dan Harkins,et al. Enrollment over Secure Transport , 2013, RFC.
[26] Kenneth G. Paterson,et al. Lucky Thirteen: Breaking the TLS and DTLS Record Protocols , 2013, 2013 IEEE Symposium on Security and Privacy.
[27] Adam Barth,et al. The Web Origin Concept , 2011, RFC.
[28] Richard L. Barnes,et al. Internet Engineering Task Force (ietf) Use Cases and Requirements for Dns-based Authentication of Named Entities (dane) , 2022 .
[29] Zhuoqing Morley Mao,et al. Internet Censorship in China: Where Does the Filtering Occur? , 2011, PAM.
[30] Anthony W. Fox,et al. Mission Accomplished , 2010, Pharmaceutical Medicine.
[31] Sid Stamm,et al. Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL , 2010 .
[32] Adrian Perrig,et al. Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing , 2008, USENIX Annual Technical Conference.
[33] Jim Schaad,et al. Certificate Management over CMS (CMC) , 2008, RFC.
[34] Bodo Möller,et al. Network Working Group Elliptic Curve Cryptography (ecc) Cipher Suites for Transport Layer Security (tls) , 2006 .
[35] Burton S. Kaliski,et al. PKCS #10: Certification Request Syntax Specification Version 1.7 , 2000, RFC.
[36] Eric Rescorla,et al. HTTP Over TLS , 2000, RFC.
[37] Stephen Farrell,et al. Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.
[38] Martin Shelton,et al. The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators , 2019, USENIX Security Symposium.
[39] Vincent Drury,et al. Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites , 2019, SOUPS @ USENIX Security Symposium.
[40] Adrienne Porter Felt,et al. Fixing HTTPS Misconfigurations at Scale: An Experiment with Security Notifications , 2019 .
[41] Jennifer Rexford,et al. Bamboozling Certificate Authorities with BGP , 2018, USENIX Security Symposium.
[42] Prateek Mittal,et al. Using BGP to Acquire Bogus TLS Certificates , 2017 .
[43] Christof Paar,et al. DROWN: Breaking TLS Using SSLv2 , 2016, USENIX Security Symposium.
[44] Kasten,et al. Server Authentication on the Past, Present, and Future Internet , 2015 .
[45] Vern Paxson,et al. An Analysis of China's "Great Cannon" , 2015 .
[46] Bodo Möller,et al. This POODLE Bites: Exploiting The SSL 3.0 Fallback , 2014 .
[47] C. Jackson,et al. Towards Short-Lived Certificates , 2012 .
[48] Donald Eastlake rd,et al. Transport Layer Security (TLS) Extensions: Extension Definitions , 2011 .
[49] Donald E. Eastlake,et al. Transport Layer Security (TLS) Extensions: Extension Definitions , 2011, RFC.
[50] Stephen Farrell,et al. Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP) , 2005, RFC.