Supersh attack ,
Guidelines for removing supersh ,
Guidelines for removinf the ca of dell ,
Trusted paths for browsers, ACM Transactions on Information and System Security, vol.8, issue.2, p.pp. ???? ,
DOI : 10.1145/1065545.1065546
Modeling Public Key Infrastructures in the Real World, Lecture Notes in Computer Science, p.pp. ??? ,
DOI : 10.1007/11533733_8
PKI seeks a trusting relationship, " in Information Security and Privacy: th Australasian Conference, Proceedings ,
Why phishing works, Proceedings of the SIGCHI conference on Human Factors in computing systems , CHI '06 ,
DOI : 10.1145/1124772.1124861
Crying wolf: an empirical study of SSL warning eeectiveness, Proceedings of the th Conference on USENIX Security Symposium (SSYM ''), pp. ?, USENIX Association ,
e seven aws of identity management: usability and security challenges, IEEE Security and Privacy, p.pp. ??? ,
Browser interfaces and extended validation SSL certiicates: an empirical study, Proceedings of the ACM Workshop on Cloud Computing Security, p.pp. ?? ,
DOI : 10.1145/1655008.1655012
Which web browsers process ssl certicates in a standardized way? " in Emerging Challenges for Security, Privacy and Trust, D. Gritzalis and Familiarity, conndence, trust: problems and alternatives, of IFIP Advances in Information and Communication Technology Trust: Making and Breaking Cooperative Relations , D. Gambetta, Ed., chapter ,
Certiicate transparency project ,
EEcient gossip protocols for verifying the consistency of certiicate logs, Proceedings of the rd IEEE International Conference on Communications and Network Security Electronic Frontier Foundation ,
Public key pinning extension for HTTP, Tech. Rep. Rfc ,
The X.509 trust model needs a technical and legal expert, 2012 IEEE International Conference on Communications (ICC) ,
DOI : 10.1109/ICC.2012.6364860
URL : https://hal.archives-ouvertes.fr/hal-01740029
PKI Interoperability: Still an Issue? A Solution in the X.509 Realm, Information Assurance and Security Education and Training ,
DOI : 10.1007/978-3-642-39377-8_8
URL : https://hal.archives-ouvertes.fr/hal-01463660
A formal model of trust for calculating the quality of X.. certiicate, Security and Communication Networks, p.pp. ? ,
Bridge certiication authorities: connecting bbb public key infrastructures ,
Cross recognition policy ,
Mozilla CA certicate inclusion policy ,
Cooperation and Trust: Some eoretical Notes ,
Logic and Limits of Trust, Ethics, p.pp. ??? ,
Can we trust trust? " in Trust: Making and Breaking Cooperative Relations ,
The right type of trust for distributed systems, Proceedings of the 1996 workshop on New security paradigms , NSPW '96, p.pp. ??? ,
DOI : 10.1145/304851.304877
Validating X.. certiicates based on their quality, Proceedings of the th International Conference for Young Computer Scientists, p.pp. ???, IEEE ,
REGRET, Proceedings of the fifth international conference on Autonomous agents , AGENTS '01, p.pp. ?? ,
DOI : 10.1145/375735.376110
Evaluating trust in a public key certiication authority, Computers & Security ,
Study for the European Commission: the legal and market aspects of electronic signatures ,
Guidelines for the issuance and management of extended validation certiicates vv ,
The most dangerous code in the world, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12 ,
DOI : 10.1145/2382196.2382204