SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements

J Clark, PC Van Oorschot - 2013 IEEE Symposium on Security …, 2013 - ieeexplore.ieee.org
Internet users today depend daily on HTTPS for secure communication with sites they intend
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …

COCA: A secure distributed online certification authority

L Zhou, FB Schneider, R Van Renesse - ACM Transactions on Computer …, 2002 - dl.acm.org
COCA is a fault-tolerant and secure online certification authority that has been built and
deployed both in a local area network and in the Internet. Extremely weak assumptions …

Physical access control

S Micali, D Engberg, P Libin, L Reyzin… - US Patent …, 2008 - Google Patents
Provisional application No. 60/370,867, filed on Apr. 8, 2002, provisional application No.
60/372,951, filed on Apr. 16, 2002, provisional application No. 60/373, 218, filed on Apr. 17 …

Efficient certificate revocation

S Micali - US Patent 7,337,315, 2008 - Google Patents
US7337315B2 - Efficient certificate revocation - Google Patents US7337315B2 - Efficient
certificate revocation - Google Patents Efficient certificate revocation Download PDF Info …

Controlling access to an area

P Libin, S Micali, D Engberg - US Patent 7,822,989, 2010 - Google Patents
Controlling access includes providing a barrier to access that includes a controller that
selectively allows access, at least one administration entity generating credentials/proofs …

Actuating a security system using a wireless device

P Libin - US Patent 7,205,882, 2007 - Google Patents
US7205882B2 - Actuating a security system using a wireless device - Google Patents
US7205882B2 - Actuating a security system using a wireless device - Google Patents …

Controlling access using additional data

P Libin, S Micali, D Engberg, A Sinelnikov - US Patent 7,600,129, 2009 - Google Patents
Determining access includes determining if particular cre dentials/proofs indicate that
access is allowed, determining if there is additional data associated with the …

A response to “can we eliminate certificate revocation lists?”

P McDaniel, A Rubin - … : 4th International Conference, FC 2000 Anguilla …, 2001 - Springer
The massive growth of electronic commerce on the Internet heightens concerns over the
lack of meaningful certificate management. One issue limiting the availability of such …

Expander graphs for digital stream authentication and robust overlay networks

D Song, D Zuckerman, JD Tygar - Proceedings 2002 IEEE …, 2002 - ieeexplore.ieee.org
We use expander graphs to provide efficient new constructions for two security applications:
authentication of long digital streams over lossy networks and building scalable, robust …

Controlling group access to doors

P Libin, S Micali, D Engberg - US Patent 7,716,486, 2010 - Google Patents
An entity controlling access of a plurality of users to at least one disconnected door includes
mapping the plurality of users to a group, for each time interval d of a sequence of dates …