<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Key management / Transport Layer Security / Internet Standards / Public key infrastructure / Domain Name System Security Extensions / Public key certificate / Certificate authority / X.509 / DNS root zone / Man-in-the-middle attack
Cryptography
Public-key cryptography
Key management
Transport Layer Security
Internet Standards
Public key infrastructure
Domain Name System Security Extensions
Public key certificate
Certificate authority
X.509
DNS root zone
Man-in-the-middle attack

XXXX Authentication Challenges in a Global Environment Stephanos Matsumoto, Carnegie Mellon University/ETH Zurich Raphael M. Reischuk, ETH Zurich Pawel Szalachowski, ETH Zurich Tiffany Hyun-Jin Kim, HRL Laboratories

Add to Reading List

Source URL: www.netsec.ethz.ch

Download Document from Source Website

File Size: 2,55 MB

Share Document on Facebook

Similar Documents

DNS data collection and analysis Kazunori Fujiwara, JPRS <> Copyright © 2015 Japan Registry Services Co., Ltd.

DNS data collection and analysis Kazunori Fujiwara, JPRS <> Copyright © 2015 Japan Registry Services Co., Ltd.

DocID: 1r0jN - View Document

Proposal to Transition the Stewardship of the Internet Assigned Numbers Authority (IANA) Functions from the U.S. Commerce Department’s National Telecommunications and Information Administration (NTIA) to the Global Mul

Proposal to Transition the Stewardship of the Internet Assigned Numbers Authority (IANA) Functions from the U.S. Commerce Department’s National Telecommunications and Information Administration (NTIA) to the Global Mul

DocID: 1qmOh - View Document

Saudi Network Information Center SaudiNIC Dr. Abdulaziz H. AlAl-Zoman Director of SaudiNIC

Saudi Network Information Center SaudiNIC Dr. Abdulaziz H. AlAl-Zoman Director of SaudiNIC

DocID: 1p8LU - View Document

MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era Qi Alfred Chen, Eric Osterweil† , Matthew Thomas†, Z. Morley Mao University of Michigan, † Verisign Labs alfchen@umich.

MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era Qi Alfred Chen, Eric Osterweil† , Matthew Thomas†, Z. Morley Mao University of Michigan, † Verisign Labs alfchen@umich.

DocID: 1p7Pn - View Document

Chain of Trust The parent-child and keyholder-keysigner relations and their communication in DNSSEC R. Gieben Stichting NLnet Labs

Chain of Trust The parent-child and keyholder-keysigner relations and their communication in DNSSEC R. Gieben Stichting NLnet Labs

DocID: 1p6u5 - View Document