Exploring the Security of Certificate Transparency in the Wild.
Bingyu LiFengjun LiZiqiang MaQianhong WuPublished in: ACNS Workshops (2020)
Keyphrases
- public key infrastructure
- authentication mechanism
- access control
- intrusion detection
- information security
- security mechanisms
- statistical databases
- public key encryption
- security issues
- security policies
- key management
- security systems
- network security
- network management
- data security
- security problems
- security threats
- neural network
- encryption scheme
- computer security
- security analysis
- security properties
- operating system
- factor authentication