Publisher
Springer Nature Switzerland
Reference28 articles.
1. Aryan, S., Aryan, H., Halderman, J.A.: Internet censorship in Iran: a first look. In: 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 2013), Washington, DC, USA. USENIX Association (2013). https://www.usenix.org/conference/foci13/workshop-program/presentation/aryan
2. Barrera, D., McCarney, D., Clark, J., van Oorschot, P.C.: Baton: certificate agility for android’s decentralized signing infrastructure. In: WiSec 2014: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, Oxford, United Kingdom, pp. 1–12. ACM (2014). https://doi.org/10.1145/2627393.2627397
3. Basin, D., Cremers, C., Kim, T.H.J., Perrig, A., Sasse, R., Szalachowski, P.: ARPKI: attack resilient public-key infrastructure. In: CCS 2014: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, pp. 382–393. ACM (2014). https://doi.org/10.1145/2660267.2660298
4. Chacon, S., Straub, B.: Pro Git, 2nd edn. Apress, Berkeley (2022). https://git-scm.com/book/en/v2
5. Coufalìková, A., Klaban, I., Šlajs, T.: Complex strategy against supply chain attacks. In: 2021 International Conference on Military Technologies (ICMT), Brno, Czech Republic, pp. 1–5. IEEE (2021). https://doi.org/10.1109/ICMT52455.2021.9502768