Ссылки на использованные материалы
[1] Adi Shamir. Cryptography: State of the sci-
ence. ACM A. M. Turing Award Lecture, June
8 2003. awards.acm.org/images/awards/
140/vstream/2002/S/s- pp/shamir_1files_
files/800x600/Slide8.html.
8 2003. awards.acm.org/images/awards/
140/vstream/2002/S/s- pp/shamir_1files_
files/800x600/Slide8.html.
Wired News Threat Level Blog, November 19
2007. www.wired.com/threatlevel/2007/11/
pgp- creator- def.
2007. www.wired.com/threatlevel/2007/11/
pgp- creator- def.
ner. meandering wild ly (blog), August 5
2008. blog.johnath.com/2008/08/05/ssl-
question- corner/.
2008. blog.johnath.com/2008/08/05/ssl-
question- corner/.
muhimedi, Neha Atri, and Lorrie F. Cranor.
Crying wolf: An empirical study of SSL warn-
ing effectiveness. In Proceedings of the 18th
Usenix Security Symposium, August 2009.
Crying wolf: An empirical study of SSL warn-
ing effectiveness. In Proceedings of the 18th
Usenix Security Symposium, August 2009.
Assumptions Lead to Bad Technol-
ogy. Freedom To Tinker, February 23
2010. www.freedom- to- tinker.com/blog/
felten/web- certification- fail- bad-
assumptions- lead- bad- technology.
ogy. Freedom To Tinker, February 23
2010. www.freedom- to- tinker.com/blog/
felten/web- certification- fail- bad-
assumptions- lead- bad- technology.
, 2010. wiki.mozilla.org/CA:Problematic_
Practices.
Practices.
15 2009. technet.microsoft.com/en- us/
library/cc751157.aspx.
library/cc751157.aspx.
www.mozilla.org/projects/security/
certs/policy/.
certs/policy/.
www.apple.com/certificateauthority/
ca_program.html.
ca_program.html.
February 15 2010.
baum, Arjen Lenstra, David Molnar, Dag Arne
Osvik, and Benne Weger. Short chosen-prefix
collisions for MD5 and the creation of a rogue
CA certificate. In Proceedings of the 29th An-
nual International Cryptology Conference on
Advances in Cryptology, pages 5569, Berlin,
Heidelberg, 2009. Springer-Verlag.
Osvik, and Benne Weger. Short chosen-prefix
collisions for MD5 and the creation of a rogue
CA certificate. In Proceedings of the 29th An-
nual International Cryptology Conference on
Advances in Cryptology, pages 5569, Berlin,
Heidelberg, 2009. Springer-Verlag.
Renegotiating tls, November 4 2009.
extendedsubset.com/wp- uploads/2009/
11/renegotiating_tls_20091104_pub.zip.
extendedsubset.com/wp- uploads/2009/
11/renegotiating_tls_20091104_pub.zip.
Ozment, and Ian Fischer. The emperor's new
security indicators. In SP '07: Proceedings
of the 2007 IEEE Symposium on Security and
Privacy, pages 5165, Washington, DC, USA,
2007. IEEE Computer Society.
security indicators. In SP '07: Proceedings
of the 2007 IEEE Symposium on Security and
Privacy, pages 5165, Washington, DC, USA,
2007. IEEE Computer Society.
thoughtcrime.org/software/sslsniff/.
2009. www.thoughtcrime.org/software/
sslstrip/.
sslstrip/.
November 24 2009. download.microsoft.
com/download/1/4/f/14f7067b- 69d3- 473a-
ba5e- 70d04aea5929/windows\%20root\
%20certificate\%20program\%20members.
pdf.
com/download/1/4/f/14f7067b- 69d3- 473a-
ba5e- 70d04aea5929/windows\%20root\
%20certificate\%20program\%20members.
pdf.
Privacy, encryption, and government back
doors in the web 2.0 era. In Journal on
Telecommunications and High Technology Law,
Forthcoming.
doors in the web 2.0 era. In Journal on
Telecommunications and High Technology Law,
Forthcoming.
on in-car computers. CNET News, Novem-
ber 19 2003. news.cnet.com/2100- 1029_3-
5109435.html.
ber 19 2003. news.cnet.com/2100- 1029_3-
5109435.html.
found in china. The New York Times, Octo-
ber 1 2008. www.nytimes.com/2008/10/02/
technology/internet/02skype.html.
ber 1 2008. www.nytimes.com/2008/10/02/
technology/internet/02skype.html.
ware on new pcs. The New York Times, June 8
2009. www.nytimes.com/2009/06/09/world/
asia/09china.html.
2009. www.nytimes.com/2009/06/09/world/
asia/09china.html.
Real Surveillance Oversight. Slight Paranoia
blog, December 1 2009. paranoia.dubfire.
net/2009/12/8- million- reasons- for-
real- surveillance.html.
blog, December 1 2009. paranoia.dubfire.
net/2009/12/8- million- reasons- for-
real- surveillance.html.
Million Times Over a Year. Wired News Threat
Level Blog, December 1 2009. www.wired.com/
threatlevel/2009/12/gps- data/.
Level Blog, December 1 2009. www.wired.com/
threatlevel/2009/12/gps- data/.
quirements, 2009. www.packetforensics.
com/export.safe.
com/export.safe.
poena processing and handling, 2004.
www.verisign.com/stellent/groups/
public/documents/data_sheet/001928.pdf.
www.verisign.com/stellent/groups/
public/documents/data_sheet/001928.pdf.
verisign/index.html.
vative broadband telephony provider focus on
core business goals, October 16 2006. www.
verisign.com/static/039933.pdf.
core business goals, October 16 2006. www.
verisign.com/static/039933.pdf.
with CALEA regulations in a cost-effective
manner, while expanding services, 2004. www.
verisign.com/stellent/groups/public/
documents/success_stories/002378.pdf.
manner, while expanding services, 2004. www.
verisign.com/stellent/groups/public/
documents/success_stories/002378.pdf.
is extra.; enlisting internet phones in the
battle against crime. The New York Times,
August 23 2004. www.nytimes.com/2004/08/
23/business/call- cheap- wiretap- extra-
enlisting- internet- phones- battle-
against- crime.html.
battle against crime. The New York Times,
August 23 2004. www.nytimes.com/2004/08/
23/business/call- cheap- wiretap- extra-
enlisting- internet- phones- battle-
against- crime.html.
Blackberry Update Spies on Users. Wired
News Threat Level Blog, July 14 2009.
www.wired.com/threatlevel/2009/07/
blackberry- spies/.
News Threat Level Blog, July 14 2009.
www.wired.com/threatlevel/2009/07/
blackberry- spies/.
sected. Veracode: Zero in a bit, July
15 2009. www.veracode.com/blog/2009/07/
blackberry- spyware- dissected/.
15 2009. www.veracode.com/blog/2009/07/
blackberry- spyware- dissected/.
Etisalat / SS8 Software, July 19 2009.
www.securityprivacyandthelaw.com/
uploads/file/RIM%20Statement.pdf.
www.securityprivacyandthelaw.com/
uploads/file/RIM%20Statement.pdf.
probability, high impact: Policy making and
extreme events. Journal of Policy Modeling,
30(1):111121, 2008.
extreme events. Journal of Policy Modeling,
30(1):111121, 2008.
externalities: the rational rejection of security
advice by users. In NSPW '09: Proceedings of
the 2009 workshop on New security paradigms
workshop, pages 133144, September 2009.
advice by users. In NSPW '09: Proceedings of
the 2009 workshop on New security paradigms
workshop, pages 133144, September 2009.
[35] Dan Kaminsky. Email conversation with au-
thor, February 28 2010.
Gmail. The Official Gmail Blog, January
12 2010. gmailblog.blogspot.com/2010/01/
default- https- access- for- gmail.html.
12 2010. gmailblog.blogspot.com/2010/01/
default- https- access- for- gmail.html.
fox Extension, March 18 2010. kuix.de/
conspiracy/.
conspiracy/.
Adrian Perrig. Perspectives: improving ssh-
style host authentication with multi-path prob-
ing. In ATC'08: USENIX 2008 Annual Tech-
nical Conference on Annual Technical Confer-
ence, pages 321334, Berkeley, CA, USA, 2008.
USENIX Association.
style host authentication with multi-path prob-
ing. In ATC'08: USENIX 2008 Annual Tech-
nical Conference on Annual Technical Confer-
ence, pages 321334, Berkeley, CA, USA, 2008.
USENIX Association.
Doublecheck: Multi-path verification against
man-in-the-middle attacks. In ISCC 2009:
IEEE Symposium on Computers and Com-
munications, pages 557563, Piscataway, NJ,
USA, 2009. IEEE.
man-in-the-middle attacks. In ISCC 2009:
IEEE Symposium on Computers and Com-
munications, pages 557563, Piscataway, NJ,
USA, 2009. IEEE.
Debian's Dress Rehearsal for a Global PKI
Compromise. IEEE Security and Privacy, 6:70
73, September 2008.
Compromise. IEEE Security and Privacy, 6:70
73, September 2008.
Brandon Enright, and Stefan Savage. When
private keys are public: results from the 2008
Debian OpenSSL vulnerability. In Proceedings
of the 9th ACM SIGCOMM conference on In-
ternet measurement conference, pages 1527,
New York, NY, USA, 2009. ACM.
private keys are public: results from the 2008
Debian OpenSSL vulnerability. In Proceedings
of the 9th ACM SIGCOMM conference on In-
ternet measurement conference, pages 1527,
New York, NY, USA, 2009. ACM.
Protection against unsafe SSL certifi-
cates, July 4 2008. www.h- online.com/
security/features/Heise- SSL- Guardian-
746213.html.
cates, July 4 2008. www.h- online.com/
security/features/Heise- SSL- Guardian-
746213.html.
a SSL Blacklist 4.0, Jan-
uary 31 2010. www.codefromthe70s.org/
sslblacklist.aspx.
uary 31 2010. www.codefromthe70s.org/
sslblacklist.aspx.
Назад[link1] | Оглавление[link2]
[link2] http://www.pgpru.com/biblioteka/statji/certifiedlies