Trustworthy and Transparent Third Party Authority
暂无分享,去创建一个
[1] Georg Carle,et al. In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements , 2018, PAM.
[2] Brent Waters,et al. Practical constructions and new proof methods for large universe attribute-based encryption , 2013, CCS.
[3] Christopher Krügel,et al. Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates , 2018, NDSS.
[4] Ueli Maurer,et al. Strengthening Access Control Encryption , 2017, ASIACRYPT.
[5] Dan Boneh,et al. Threshold Cryptosystems From Threshold Fully Homomorphic Encryption , 2018, IACR Cryptol. ePrint Arch..
[6] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .
[7] Nishant Doshi,et al. Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption , 2016 .
[8] Ralf Sasse,et al. Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure , 2016, IEEE Transactions on Dependable and Secure Computing.
[9] Georg Carle,et al. The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem , 2018, Internet Measurement Conference.
[10] Mark Ryan,et al. DECIM: Detecting Endpoint Compromise In Messaging , 2018, IEEE Transactions on Information Forensics and Security.
[11] Scott Chacon,et al. Pro Git , 2009, Apress.
[12] Deepak Kumar,et al. Tracking Certificate Misissuance in the Wild , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[13] Ralph Holz,et al. A First Look at Certification Authority Authorization (CAA) , 2018, CCRV.
[14] Douglas Stebila,et al. Secure Logging Schemes and Certificate Transparency , 2016, ESORICS.
[15] Carl Nykvist,et al. How Certificate Transparency Impact the Performance , 2017 .
[16] Melissa Chase,et al. Transparency Overlays and Applications , 2016, IACR Cryptol. ePrint Arch..
[17] Brent Waters,et al. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.
[18] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[19] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[20] Neal Leavitt,et al. Internet Security under Attack: The Undermining of Digital Certificates , 2011, Computer.
[21] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[22] Jing Chen,et al. CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[23] Vinod Vaikuntanathan,et al. Predicate Encryption for Circuits from LWE , 2015, CRYPTO.
[24] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[25] Brent Waters,et al. Functional Encryption: Definitions and Challenges , 2011, TCC.
[26] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[27] Craig Gentry,et al. (Leveled) Fully Homomorphic Encryption without Bootstrapping , 2014, ACM Trans. Comput. Theory.
[28] Mihir Bellare,et al. Interactive Message-Locked Encryption and Secure Deduplication , 2015, Public Key Cryptography.
[29] Brent Waters,et al. Functional Encryption for Regular Languages , 2012, CRYPTO.
[30] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[31] Mark Ryan,et al. Enhanced Certificate Transparency and End-to-End Encrypted Mail , 2014, NDSS.
[32] Dan Boneh,et al. IRON: Functional Encryption using Intel SGX , 2017, CCS.
[33] Marco Chiesa,et al. Analysis of Country-Wide Internet Outages Caused by Censorship , 2014, IEEE/ACM Transactions on Networking.
[34] Melissa Chase,et al. FAME: Fast Attribute-based Message Encryption , 2017, CCS.
[35] Ben Laurie. Certificate Transparency , 2014, ACM Queue.
[36] Adrian Perrig,et al. Efficient gossip protocols for verifying the consistency of Certificate logs , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[37] Dan Boneh,et al. Certificate Transparency with Privacy , 2017, Proc. Priv. Enhancing Technol..