Back to Results
First PageMeta Content
Certificate authorities / Cryptographic protocols / Electronic commerce / DigiNotar / Extended Validation Certificate / GlobalSign / Comodo Group / Root certificate / X.509 / Cryptography / Key management / Public-key cryptography


T ECHNOLOGY NE W S Internet Security under Attack: The Undermining of Digital Certificates
Add to Reading List

Document Date: 2013-04-12 14:46:07


Open Document

File Size: 1,48 MB

Share Result on Facebook

City

Fallbrook / /

Company

Go Daddy / Sophos / Whisper Systems / Security Curve / StartCom / VeriSign / Microsoft Trustworthy Computing Group / CAs / Internet Storm Center / Google / GlobalSign / Frost / Equifax / Network Box UK / Leavitt Communications / Comodo / /

Country

France / Brazil / United Kingdom / China / India / /

Currency

USD / /

/

Facility

Carnegie Mellon University / SANS Institute / /

IndustryTerm

out-ofdate software / online security / communications / electronic communications / fake e-commerce sites / Internet Security / Internet-connected servers / unsecured Internet / technology strategy / public-key infrastructure / Internet security firm Network / trust-management protocols / technology topics / public-key algorithm / Internet communications / antivirus software / /

OperatingSystem

Microsoft Windows / /

Organization

Massachusetts Institute of Technology / Internet Engineering Task Force / Carnegie Mellon University / University of Maryland University College / Electronic Frontier Foundation / SANS Institute / Cyber Command / International Telecommunication Union / /

Person

Lee Garber / Simon Heron / Martin Hellman / Richard Martinez / Adi Shamir / Phillip Halam-Baker / Ed Moyle / Moxie Marlinspike / Leonard Adleman / Ron Rivest / David Andersen / Whitfield Diffie / Jessica Dash / Eddy Nigg / Johannes Ullrich / James Lyne / Neal Leavitt / /

/

Position

president / director and security analyst / chief technology officer / computer science professor / principal analyst / Editor / director of technology strategy at Internet security firm / spokesperson / vice president and principal scientist / chief operating officer and chief technology officer / network security research analyst / director of technology strategy / /

ProvinceOrState

California / Massachusetts / /

Technology

PKI / encryption / antivirus software / digital signature / public-key algorithm / Hypertext Transfer Protocol / private key / SSL / trust-management protocols / public-key infrastructure / Digital Certificate / public key / DNS / HTTP / Secure Sockets Layer technology / TLS encryption / /

URL

www.leavcom / /

SocialTag