Essays about: "Certificate Transparency CT"
Found 4 essays containing the words Certificate Transparency CT.
-
1. LF-PKI: Practical, Secure, and High-Performance Design and Implementation of a Lite Flexible PKI
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Today’s Web Public Key Infrastructure (PKI) builds on a homogeneous trust model. All Certificate Authorities (CAs) are equally trusted once they are marked as trusted CAs on the client side. As a result, the security of the Web PKI depends on the weakest CA. READ MORE
-
2. Distributed Client Driven Certificate Transparency Log
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : High profile cyber attacks such as the one on DigiNotar in 2011, where a Certificate Authority (CA) was compromised, has shed light on the vulnerabilities of the internet. In order to make the internet safer in terms of exposing fraudulent certificates, CertificateTransparency (CT) was introduced. READ MORE
-
3. Aggregating Certificate Transparency Gossip Using Programmable Packet Processors
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Certificate Transparency (CT) logs are append-only tamper-evident data structures that can be verified by anyone. For example, it is possible to challenge a log to prove certificate inclusion (membership) and log consistency (append-only, no tampering) based on partial information. READ MORE
-
4. How Certificate Transparency Impact the Performance
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Security on the Internet is essential to ensure the privacy of an individual. Today, Trans- port Layer Security (TLS) and certificates are used to ensure this. But certificates are not enough in order to maintain confidentiality and therefore a new concept, Certificate Trans- parency (CT), has been introduced. READ MORE