Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper)
Open Access
- 1 January 2012
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- When private keys are publicPublished by Association for Computing Machinery (ACM) ,2009
- So long, and no thanks for the externalitiesPublished by Association for Computing Machinery (ACM) ,2009
- DoubleCheck: Multi-path verification against man-in-the-middle attacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA CertificatePublished by Springer Nature ,2009
- Two Years of Broken Crypto: Debian's Dress Rehearsal for a Global PKI CompromiseIEEE Security & Privacy, 2008
- Security and identification indicators for browsers against spoofing and phishing attacksACM Transactions on Internet Technology, 2008
- Low probability, high impact: Policy making and extreme eventsJournal of Policy Modeling, 2008
- Weak Authentication: How to Authenticate Unknown Principals without Trusted PartiesPublished by Springer Nature ,2004
- The Resurrecting Duckling: Security Issues for Ad-hoc Wireless NetworksPublished by Springer Nature ,2000
- A certification scheme for electronic commercePublished by Springer Nature ,1997