Sign in

LogPicker: Strengthening Certificate Transparency Against Covert Adversaries.

Alexandra DirksenDavid KleinRobert MichaelTilman StehrKonrad RieckMartin Johns
Published in: Proc. Priv. Enhancing Technol. (2021)
Keyphrases
  • information flow
  • terrorist networks
  • computer vision
  • key players
  • public key infrastructure
  • multiscale