Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

N Kaaniche, M Laurent, S Belguith - Journal of Network and Computer …, 2020 - Elsevier
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …

Measuring {HTTPS} adoption on the web

AP Felt, R Barnes, A King, C Palmer, C Bentzel… - 26th USENIX security …, 2017 - usenix.org
HTTPS ensures that the Web has a base level of privacy and integrity. Security engineers,
researchers, and browser vendors have long worked to spread HTTPS to as much of the …

Does certificate transparency break the web? Measuring adoption and error rate

E Stark, R Sleevi, R Muminovic… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Certificate Transparency (CT) is an emerging system for enabling the rapid discovery of
malicious or misissued certificates. Initially standardized in 2013, CT is now finally beginning …

Postcards from the post-http world: Amplification of https vulnerabilities in the web ecosystem

S Calzavara, R Focardi, M Nemec… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
HTTPS aims at securing communication over the Web by providing a cryptographic
protection layer that ensures the confidentiality and integrity of communication and enables …

Talking with familiar strangers: An empirical study on https context confusion attacks

M Zhang, X Zheng, K Shen, Z Kong, C Lu… - Proceedings of the …, 2020 - dl.acm.org
HTTPS is principally designed for secure end-to-end communication, which adds
confidentiality and integrity to sensitive data transmission. While several man-in-the-middle …

Derivation and Analysis of Cryptographic Protocol Implementation

AT Rasoamanana - 2023 - theses.hal.science
TLS and SSH are two well-known and thoroughly studied security protocols. In this thesis,
we focus on a specific class of vulnerabilities affecting both protocols implementations, state …

Exploring the possibility of blockchain and smart contract-based digital certificate

PR Kumar, PH Raj, S Tajuddin - Advances in Cyber Security and …, 2022 - taylorfrancis.com
The main objective of this research is to explore the possibility of using blockchain and smart
contracts to provide a digital certificate for secure communication on the internet, which is …

Path aware transport layer solution for mobile networks

SS Gantha, S Jaiswal, JM Ppallan… - IEEE Access, 2020 - ieeexplore.ieee.org
The revolutionary Fifth Generation (5G) network technology has already been deployed in
many countries to provide end-to-end quality-of-service for a wide variety of services …

Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem

X de Carné de Carnavalet - 2019 - spectrum.library.concordia.ca
Transport Layer Security (TLS) is one of the most widely deployed cryptographic protocols
on the Internet that provides confidentiality, integrity, and a certain degree of authenticity of …

Challenging RSA cryptosystem implementations

M Nemec - 2020 - dspace.unive.it
The aim of our research was to study security properties of real-world deployments of the
RSA cryptosystem. First we analyze RSA key generation methods in cryptographic libraries …