Author:
Chuat Laurent,Abdou AbdelRahman,Sasse Ralf,Sprenger Christoph,Basin David,Perrig Adrian
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. ADEM: An Authentic Digital EMblem;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
2. A Survey and Analysis of TLS Interception Mechanisms and Motivations: Exploring how end-to-end TLS is made “end-to-me” for web traffic;ACM Computing Surveys;2023-07-13
3. A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies;IEEE Communications Surveys & Tutorials;2023
4. Hammurabi;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07
5. Assessing certificate validation user interfaces of WPA supplicants;Proceedings of the 28th Annual International Conference on Mobile Computing And Networking;2022-10-14