Ghazal: Toward Truly Authoritative Web Certificates Using Ethereum
暂无分享,去创建一个
[1] Michael J. Freedman,et al. CONIKS: Bringing Key Transparency to End Users , 2015, USENIX Security Symposium.
[2] Muneeb Ali,et al. Blockstack: A Global Naming and Storage System Secured by Blockchains , 2016, USENIX Annual Technical Conference.
[3] Arvind Narayanan,et al. An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design , 2015, WEIS.
[4] Melissa Chase,et al. Transparency Overlays and Applications , 2016, IACR Cryptol. ePrint Arch..
[5] Ben Laurie. Certificate Transparency , 2014, ACM Queue.
[6] Ralf Sasse,et al. ARPKI: Attack Resilient Public-Key Infrastructure , 2014, CCS.
[7] David Wolinsky,et al. Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[8] Mustafa Al-Bassam. SCPKI: A Smart Contract-based PKI and Identity System , 2017 .
[9] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[10] Alex Pentland,et al. Verifiable Anonymous Identities and Access Control in Permissioned Blockchains , 2019, ArXiv.
[11] Dragos Velicanu,et al. CertCoin : A NameCoin Based Decentralized Authentication System 6 . 857 Class Project , 2014 .
[12] Nick Szabo,et al. Formalizing and Securing Relationships on Public Networks , 1997, First Monday.
[13] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[14] Joseph Bonneau,et al. EthIKS: Using Ethereum to Audit a CONIKS Key Transparency Log , 2016, Financial Cryptography Workshops.
[15] J. Alex Halderman,et al. Analysis of the HTTPS certificate ecosystem , 2013, Internet Measurement Conference.
[16] Michael Goldsmith,et al. PB-PKI: A Privacy-aware Blockchain-based PKI , 2017, SECRYPT.
[17] Georg Carle,et al. The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements , 2011, IMC '11.
[18] Daiping Liu,et al. All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records , 2016, CCS.
[19] Jeremy Clark,et al. 2013 IEEE Symposium on Security and Privacy SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements , 2022 .
[20] Michael Myers. Revocation: Options and Challenges , 1998, Financial Cryptography.
[21] Raphael M. Reischuk,et al. IKP: Turning a PKI Around with Blockchains , 2016, IACR Cryptol. ePrint Arch..
[22] Vitaly Shmatikov,et al. The Hitchhiker's Guide to DNS Cache Poisoning , 2010, SecureComm.
[23] Adrian Perrig,et al. Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing , 2008, USENIX Annual Technical Conference.
[24] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..