Let's Encrypt: an automated certificate authority to encrypt the entire web

J Aas, R Barnes, B Case, Z Durumeric… - Proceedings of the …, 2019 - dl.acm.org
Let's Encrypt is a free, open, and automated HTTPS certificate authority (CA) created to
advance HTTPS adoption to the entire Web. Since its launch in late 2015, Let's Encrypt has …

Distributed cyber-infrastructures and artificial intelligence in hybrid post-quantum era

AA Yavuz, SE Nouma, T Hoang, D Earl… - 2022 IEEE 4th …, 2022 - ieeexplore.ieee.org
Distributed cyber-infrastructures and Artificial Intelligence (AI) are transformative
technologies that will play a pivotal role in the future of society and the scientific community …

Technical infrastructure as a hidden terrain of disinformation

S Bradshaw, L DeNardis - Journal of Cyber Policy, 2024 - Taylor & Francis
While social media disinformation has received significant academic and policy attention,
more consequential forms of intentional manipulation target the underlying digital …

Changing of the guards: Certificate and public key management on the internet

CM Bruhner, O Linnarsson, M Nemec, M Arlitt… - … Conference on Passive …, 2022 - Springer
Certificates are the foundation of secure communication over the internet. However, not all
certificates are created and managed in a consistent manner and the certificate authorities …

Key event receipt infrastructure (keri)

SM Smith - arXiv preprint arXiv:1907.02143, 2019 - arxiv.org
An identity system based secure overlay for the Internet is presented. This includes a
primary root-of-trust in self-certifying identifiers. It presents a formalism for Autonomic …

Estonian electronic identity card: security flaws in key management

A Parsovs - 29th USENIX Security Symposium (USENIX Security …, 2020 - usenix.org
The Estonian electronic identity card (ID card) is considered to be one of the most successful
deployments of smart card-based national ID card systems in the world. The public-key …

[HTML][HTML] Public key infrastructure: an enhanced validation framework

P Danquah, H Kwabena-Adade - Journal of Information Security, 2020 - scirp.org
Public Key Infrastructure (PKI) is a comprehensive information security framework for
providing secure information and communication over the internet. Its need and use has …

Trust zones: A path to a more secure internet infrastructure

D Clark, KC Claffy - Journal of Information Policy, 2021 - scholarlypublishingcollective.org
This article describes a data-driven approach to improve the security of the Internet
infrastructure. We identify the key vulnerabilities, and describe why the barriers to progress …

Heterogeneous-PAKE: Bridging the gap between PAKE protocols and their real-world deployment

R Wei, F Zheng, L Gao, J Dong, G Fan, L Wan… - Proceedings of the 37th …, 2021 - dl.acm.org
Two entities, who only share a password and communicate over an insecure channel,
authenticate each other and agree on a large session key for protecting their subsequent …

Blindfold: Keeping private keys in PKIs and CDNs out of sight

H Galal, M Mannan, A Youssef - Computers & Security, 2022 - Elsevier
Public key infrastructure (PKI) is a certificate-based technology that helps in authenticating
systems identities. HTTPS/TLS relies mainly on PKI to minimize fraud over the Internet …