DigiNotar

Results: 62



#Item
11DigiNotar / Certificate authority / Extended Validation Certificate / CAcert.org / HTTP Secure / Transport Layer Security / Comodo Group / Public key certificate / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Kai Engert https://kuix.de

Add to Reading List

Source URL: kuix.de

Language: English - Date: 2012-02-06 06:51:49
12Public key certificate / X.509 / Revocation list / Certificate authority / Public key infrastructure / Online Certificate Status Protocol / Certificate policy / DigiNotar / Cryptography / Public-key cryptography / Key management

Certification Practice Statement certSIGN Version 1.7 Date: 4 September 2011 . © Copyright certSIGN. All rights reserved.

Add to Reading List

Source URL: www.certsign.ro

Language: English - Date: 2012-01-25 14:17:41
13DigiNotar / Extended Validation Certificate / Certificate authority / GlobalSign / X.509 / CA/Browser Forum / Public key certificate / HTTP Secure / Root certificate / Cryptography / Public-key cryptography / Key management

The weakest link in the chain: Vulnerabilities in the SSL certificate authority system and what should be done about them An Access Policy Brief Regarding the Consequences of the DigiNotar breach

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2011-11-21 16:23:25
14Public key certificate / X.509 / Revocation list / Certificate authority / Public key infrastructure / Online Certificate Status Protocol / Object identifier / Certificate policy / DigiNotar / Cryptography / Public-key cryptography / Key management

WEBCARES CERTIFICATION PRACTICE STATEMENT v2.8 OPEN ACCESS TECHNOLOGY INTERNATIONAL, INC.

Add to Reading List

Source URL: www.oaticerts.com

Language: English - Date: 2014-11-12 15:31:45
15Cryptographic protocols / Secure communication / Electronic commerce / DigiNotar / HTTP Secure / Public key certificate / Certificate authority / Transport Layer Security / X.509 / Cryptography / Public-key cryptography / Key management

To Trust, or not to Trust, that is the Question: Structural Properties of X.509 Certificates Johanna Amann1 , Robin Sommer1,3 , Matthias Vallentin2 , Seth Hall1 1 International Computer Science Institute 2 UC Berkeley

Add to Reading List

Source URL: tinytocs.org

Language: English - Date: 2015-03-07 12:34:01
16Certificate authorities / Cryptographic protocols / Electronic commerce / DigiNotar / Extended Validation Certificate / GlobalSign / Comodo Group / Root certificate / X.509 / Cryptography / Key management / Public-key cryptography

T ECHNOLOGY NE W S Internet Security under Attack: The Undermining of Digital Certificates

Add to Reading List

Source URL: www.leavcom.com

Language: English - Date: 2013-04-12 14:46:07
17Certificate authorities / Cryptographic protocols / Electronic commerce / Root certificate / X.509 / Public key certificate / DigiNotar / HTTP Secure / GlobalSign / Cryptography / Public-key cryptography / Key management

Analysis of the HTTPS Certificate Ecosystem

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2014-08-05 13:28:20
18

References: https://tools.ietf.org/html/rfc6698 https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities https://en.wikipedia.org/wiki/DigiNotar https://en.wikipedia.org/wiki/X.509#Problems_with_certifica

Add to Reading List

Source URL: s3.amazonaws.com

- Date: 2014-03-18 16:12:36
    19Secure communication / Key management / Public-key cryptography / Cryptographic protocols / DigiNotar / Computer security / Certificate authority / International Multilateral Partnership Against Cyber Threats / Public key certificate / Cryptography / Security / Electronic commerce

    Microsoft Word - 48-3_Bambauer.docx

    Add to Reading List

    Source URL: lawreview.law.ucdavis.edu

    Language: English - Date: 2015-02-23 18:56:54
    20Electronic commerce / DigiNotar / Certificate authority / Transport Layer Security / Public key certificate / Cryptography / Key management / Public-key cryptography

    Certificate Authority Collapse Can HTTPS Web Browsing Be Secured Through Regulation? A.M. Arnbak LL.M.

    Add to Reading List

    Source URL: www.lawtech.hk

    Language: English - Date: 2013-03-04 03:36:49
    UPDATE