Author:
Chuat Laurent,Abdou AbdelRahman,Sasse Ralf,Sprenger Christoph,Basin David,Perrig Adrian
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Chain-Sawing: A Longitudinal Analysis of Certificate Chains;2024 IFIP Networking Conference (IFIP Networking);2024-06-03
2. The Inventory is Dark and Full of Misinformation: Understanding Ad Inventory Pooling in the Ad-Tech Supply Chain;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
3. Investigate and Improve the Certificate Revocation in Web PKI;NOMS 2024-2024 IEEE Network Operations and Management Symposium;2024-05-06
4. On the Complexity of the Web’s PKI: Evaluating Certificate Validation of Mobile Browsers;IEEE Transactions on Dependable and Secure Computing;2024-01
5. ADEM: An Authentic Digital EMblem;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15