Publisher
Springer Nature Singapore
Reference21 articles.
1. Merabti, M., Kennedy, M., Hurst, W.: Critical infrastructure protection: A 21 st century challenge. 2011 International Conference on Communications and Information Technology (ICCIT), 1–6. IEEE (2011)
2. Aas, J., Barnes, R., Case, B., et al.: Let’s Encrypt: an automated certificate authority to encrypt the entire web. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2473–2487 (2019)
3. Soghoian, C., Stamm, S.: Certified lies: Detecting and defeating government interception attacks against SSL (short paper). In: International Conference on Financial Cryptography and Data Security, pp. 250–259. Springer Berlin Heidelberg, Berlin, Heidelberg (2011)
4. Wang, M., Qian, C., Li, X., et al.: Collaborative validation of public-key certificates for IoT by distributed caching. IEEE/ACM Trans. Networking 29(1), 92–105 (2020)
5. Kasten, J., Wustrow, E., Halderman, J.A.: Cage: Taming certificate authorities by inferring restricted scopes. In: Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers 17, pp. 329-337. Springer Berlin Heidelberg (2013)