. Lenovo, Supersh attack

. Lenovo, Guidelines for removing supersh

. Dell, Guidelines for removinf the ca of dell

Z. Ye, S. Smith, and D. Anthony, Trusted paths for browsers, ACM Transactions on Information and System Security, vol.8, issue.2, p.pp. ????
DOI : 10.1145/1065545.1065546

J. Marchesini and S. Smith, Modeling Public Key Infrastructures in the Real World, Lecture Notes in Computer Science, p.pp. ???
DOI : 10.1007/11533733_8

A. Jøsang, I. G. Pedersen, and D. Povey, PKI seeks a trusting relationship, " in Information Security and Privacy: th Australasian Conference, Proceedings

R. Dhamija, J. D. Tygar, and M. Hearst, Why phishing works, Proceedings of the SIGCHI conference on Human Factors in computing systems , CHI '06
DOI : 10.1145/1124772.1124861

J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor, Crying wolf: an empirical study of SSL warning eeectiveness, Proceedings of the th Conference on USENIX Security Symposium (SSYM ''), pp. ?, USENIX Association

R. Dhamija and L. Dusseault, e seven aws of identity management: usability and security challenges, IEEE Security and Privacy, p.pp. ???

R. Biddle, P. C. Van-oorschot, A. S. Patrick, J. Sobey, and T. Whalen, Browser interfaces and extended validation SSL certiicates: an empirical study, Proceedings of the ACM Workshop on Cloud Computing Security, p.pp. ??
DOI : 10.1145/1655008.1655012

A. S. Wazan, R. Laborde, D. W. Chadwick, F. Barrere, and A. Benzekri, Which web browsers process ssl certicates in a standardized way? " in Emerging Challenges for Security, Privacy and Trust, D. Gritzalis and Familiarity, conndence, trust: problems and alternatives, of IFIP Advances in Information and Communication Technology Trust: Making and Breaking Cooperative Relations , D. Gambetta, Ed., chapter

. Google, Certiicate transparency project

L. Chuat, P. Szalachowski, A. Perrig, B. Laurie, and E. Messeri, EEcient gossip protocols for verifying the consistency of certiicate logs, Proceedings of the rd IEEE International Conference on Communications and Network Security Electronic Frontier Foundation

R. Sleevi, C. Evans, C. Palmer, and G. Inc, Public key pinning extension for HTTP, Tech. Rep. Rfc

R. [. Wazan, F. Laborde, A. Barrere, and X. Benzekri, The X.509 trust model needs a technical and legal expert, 2012 IEEE International Conference on Communications (ICC)
DOI : 10.1109/ICC.2012.6364860

URL : https://hal.archives-ouvertes.fr/hal-01740029

A. S. Wazan, R. Laborde, F. Barrere, A. Benzekri, and D. W. Chadwick, PKI Interoperability: Still an Issue? A Solution in the X.509 Realm, Information Assurance and Security Education and Training
DOI : 10.1007/978-3-642-39377-8_8

URL : https://hal.archives-ouvertes.fr/hal-01463660

C. Itu, A formal model of trust for calculating the quality of X.. certiicate, Security and Communication Networks, p.pp. ?

N. [. Polk and . Hastings, Bridge certiication authorities: connecting bbb public key infrastructures

P. Gatekeeper and . Framework, Cross recognition policy

. Mozilla, Mozilla CA certicate inclusion policy

M. Deutsch, Cooperation and Trust: Some eoretical Notes

N. Luhmann, . Trust, and . Power, Logic and Limits of Trust, Ethics, p.pp. ???

D. Gambetta, Can we trust trust? " in Trust: Making and Breaking Cooperative Relations

A. Jøsang, The right type of trust for distributed systems, Proceedings of the 1996 workshop on New security paradigms , NSPW '96, p.pp. ???
DOI : 10.1145/304851.304877

A. S. Wazan, R. Laborde, F. Barrére, and A. Benzekri, Validating X.. certiicates based on their quality, Proceedings of the th International Conference for Young Computer Scientists, p.pp. ???, IEEE

J. Sabater and C. Sierra, REGRET, Proceedings of the fifth international conference on Autonomous agents , AGENTS '01, p.pp. ??
DOI : 10.1145/375735.376110

D. W. Chadwick and A. Basden, Evaluating trust in a public key certiication authority, Computers & Security

J. Dumortier, S. Kelm, H. Nilsson, G. Skouma, and P. Van-eecke, Study for the European Commission: the legal and market aspects of electronic signatures

C. Forum, Guidelines for the issuance and management of extended validation certiicates vv

M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh et al., The most dangerous code in the world, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12
DOI : 10.1145/2382196.2382204