Back to Results
First PageMeta Content
Electronic commerce / Cryptographic protocols / Secure messaging / Certificate authority / Transport Layer Security / Public key certificate / Cryptographic hash function / Public key fingerprint / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management


Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri
Add to Reading List

Document Date: 2015-04-10 15:07:29


Open Document

File Size: 578,74 KB

Share Result on Facebook
UPDATE