Let's Encrypt: an automated certificate authority to encrypt the entire web
J Aas, R Barnes, B Case, Z Durumeric… - Proceedings of the …, 2019 - dl.acm.org
Let's Encrypt is a free, open, and automated HTTPS certificate authority (CA) created to
advance HTTPS adoption to the entire Web. Since its launch in late 2015, Let's Encrypt has …
advance HTTPS adoption to the entire Web. Since its launch in late 2015, Let's Encrypt has …
Distributed cyber-infrastructures and artificial intelligence in hybrid post-quantum era
Distributed cyber-infrastructures and Artificial Intelligence (AI) are transformative
technologies that will play a pivotal role in the future of society and the scientific community …
technologies that will play a pivotal role in the future of society and the scientific community …
Technical infrastructure as a hidden terrain of disinformation
S Bradshaw, L DeNardis - Journal of Cyber Policy, 2024 - Taylor & Francis
While social media disinformation has received significant academic and policy attention,
more consequential forms of intentional manipulation target the underlying digital …
more consequential forms of intentional manipulation target the underlying digital …
Changing of the guards: Certificate and public key management on the internet
Certificates are the foundation of secure communication over the internet. However, not all
certificates are created and managed in a consistent manner and the certificate authorities …
certificates are created and managed in a consistent manner and the certificate authorities …
Key event receipt infrastructure (keri)
SM Smith - arXiv preprint arXiv:1907.02143, 2019 - arxiv.org
An identity system based secure overlay for the Internet is presented. This includes a
primary root-of-trust in self-certifying identifiers. It presents a formalism for Autonomic …
primary root-of-trust in self-certifying identifiers. It presents a formalism for Autonomic …
Estonian electronic identity card: security flaws in key management
A Parsovs - 29th USENIX Security Symposium (USENIX Security …, 2020 - usenix.org
The Estonian electronic identity card (ID card) is considered to be one of the most successful
deployments of smart card-based national ID card systems in the world. The public-key …
deployments of smart card-based national ID card systems in the world. The public-key …
[HTML][HTML] Public key infrastructure: an enhanced validation framework
P Danquah, H Kwabena-Adade - Journal of Information Security, 2020 - scirp.org
Public Key Infrastructure (PKI) is a comprehensive information security framework for
providing secure information and communication over the internet. Its need and use has …
providing secure information and communication over the internet. Its need and use has …
Trust zones: A path to a more secure internet infrastructure
D Clark, KC Claffy - Journal of Information Policy, 2021 - scholarlypublishingcollective.org
This article describes a data-driven approach to improve the security of the Internet
infrastructure. We identify the key vulnerabilities, and describe why the barriers to progress …
infrastructure. We identify the key vulnerabilities, and describe why the barriers to progress …
Heterogeneous-PAKE: Bridging the gap between PAKE protocols and their real-world deployment
Two entities, who only share a password and communicate over an insecure channel,
authenticate each other and agree on a large session key for protecting their subsequent …
authenticate each other and agree on a large session key for protecting their subsequent …
Blindfold: Keeping private keys in PKIs and CDNs out of sight
Public key infrastructure (PKI) is a certificate-based technology that helps in authenticating
systems identities. HTTPS/TLS relies mainly on PKI to minimize fraud over the Internet …
systems identities. HTTPS/TLS relies mainly on PKI to minimize fraud over the Internet …