Characterizing the Root Landscape of Certificate Transparency Logs

13 Jan 2020 Korzhitskii Nikita Carlsson Niklas

Internet security and privacy stand on the trustworthiness of public certificates signed by Certificate Authorities (CAs). However, software products do not trust the same CAs and therefore maintain different root stores, each typically containing hundreds of trusted roots capable of issuing "trusted" certificates for any domain... (read more)

PDF Abstract
No code implementations yet. Submit your code now

Categories


  • NETWORKING AND INTERNET ARCHITECTURE
  • CRYPTOGRAPHY AND SECURITY