DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Trust on first use
Trust on first use
No.Ntnu:Inspera:2546742.Pdf (10.61Mb)
Easy Encryption for Email, Photo, and Other Cloud Services John Seunghyun Koh
Best Practices for Privileged Access Management on Cloud-Native Infrastructure
Challenges in Managing SSH Keys – and a Call for Solutions
Maintaining Security and Trust in Large Scale Public Key Infrastructures
Perspectives: Improving SSH-Style Host Authentication with Multi-Path Probing
Automated Verification for Secure Messaging Protocols and Their
Public Key Pinning for TLS Using a Trust on First Use Model
Secure Transport Protocols
Paper, We Provide a Broad Perspective of the for Enhancing the Certificate Infrastructure Used in Practice
CSCI-UA.9480 Introduction to Computer Security
SSL Virtual Clean Room Security Architecture 1 Problem Statement 2 Technology Overview
Pervasive Internet-Wide Low-Latency Authentication
Sok: Delegation and Revocation, the Missing Links in the Web's Chain Of
Incorporating Trust in Public Key Infrastructure Certificates
SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements
Best Practices for Privileged Access Management on Elastic Infrastructure
Secure Messaging for Normal People October 27, 2015 – Version 1.0
Top View
A Comparison of Secure Messaging Protocols and Implementations
The Snowden Phone: a Comparative Survey of Secure Instant Messaging Mobile Applications
Sok: Securing Email—A Stakeholder-Based Analysis
When HTTPS Meets CDN: a Case of Authentication in Delegated Service
The SSL Landscape – a Thorough Analysis of the X.509 PKI Using Active and Passive Measurements
Public Key Infrastructure Notes
CS 261 Notes: Secure Messaging
Doublecheck: Multi-Path Verification Against Man-In-The-Middle Attacks
Automated Key Management for End-To-End Encrypted Email Communication Final Talk for the Guided Research By
The X3DH Protocol: a Proof of Security
Evaluating Web Pkis
Analysing the Signal Protocol a Manual and Automated Analysis of the Signal Protocol
STEED — Usable End-To-End Encryption Werner Koch, Marcus Brinkmann
Challenges in Managing SSH Keys – and a Call for Solutions
Whatsapp Security Paper Analysis Calvin Li, Daniel Sanchez, Sean Hua
Secure Email
Formal Verification for Real-World Cryptographic Protocols and Implementations Nadim Kobeissi
Securing the SSL/TLS Channel Against Man
Lecture Slides
The Snowden Phone: a Comparative Survey of Secure Instant Messaging Mobile Applications
Secure Messaging1
Why Johnny Can't Fix PGP Standardization
The Potential of an Individualized Set of Trusted Cas: Defending Against CA Failures in the Web PKI (Extended Version) ⋆ 1
(E2EE) Messaging
Popa & Wagner Spring 2016 CS 161 Computer Security 3/7 Key Management 1 Man-In-The-Middle Attacks
Comparing Implementations of Secure Messaging Protocols (Long Version) Christian Johansen , Aulon Mujaj , Hamed Arshad , Josef Noll Research Report 475, November 2017
Detecting and Defeating Government Interception Attacks Against SSL?
Sok: Securing Email—A Stakeholder-Based Analysis