{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:38:42Z","timestamp":1773157122945,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030036379","type":"print"},{"value":"9783030036386","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03638-6_11","type":"book-chapter","created":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T03:12:53Z","timestamp":1541041973000},"page":"171-183","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Verifiable Light-Weight Monitoring for Certificate Transparency Logs"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0840-5072","authenticated-orcid":false,"given":"Rasmus","family":"Dahlberg","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6459-8409","authenticated-orcid":false,"given":"Tobias","family":"Pulls","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,2]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Chuat, L., Szalachowski, P., Perrig, A., Laurie, B., Messeri, E.: Efficient gossip protocols for verifying the consistency of certificate logs. In: IEEE Conference on Communications and Network Security (CNS), pp. 415\u2013423, September 2015","DOI":"10.1109\/CNS.2015.7346853"},{"key":"11_CR2","unstructured":"Crosby, S.A., Wallach, D.S.: Efficient data structures for tamper-evident logging. In: 18th USENIX Security Symposium, pp. 317\u2013334, August 2009"},{"issue":"2","key":"11_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2019599.2019602","volume":"14","author":"Scott A. Crosby","year":"2011","unstructured":"Crosby, S.A., Wallach, D.S.: Authenticated dictionaries: Real-world costs and trade-offs. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(2), 17:1\u201317:30 (2011)","journal-title":"ACM Transactions on Information and System Security"},{"key":"11_CR4","unstructured":"Dahlberg, R., Pulls, T., Vestin, J., H\u00f8iland-J\u00f8rgensen, T., Kassler, A.: Aggregation-based gossip for certificate transparency. CoRR abs\/1806.08817, August 2018"},{"key":"11_CR5","first-page":"127","volume-title":"Lecture Notes in Computer Science","author":"David Derler","year":"2015","unstructured":"Derler, D., Hanser, C., Slamanig, D.: Revisiting cryptographic accumulators, additional properties and relations to other primitives. In: Topics in Cryptology-Proceedings of the Cryptographer\u2019s Track at the RSA Conference (CT-RSA), pp. 127\u2013144, April 2015"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., Kasten, J., Bailey, M., Halderman, J.A.: Analysis of the HTTPS certificate ecosystem. In: Proceedings of the 2013 Internet Measurement Conference, pp. 291\u2013304, October 2013","DOI":"10.1145\/2504730.2504755"},{"key":"11_CR7","unstructured":"Eijdenberg, A., Laurie, B., Cutter, A.: Verifiable data structures. Google research document, November 2015. https:\/\/github.com\/google\/trillian\/blob\/master\/docs\/VerifiableDataStructures.pdf . Accessed 16 Sep 2018"},{"key":"11_CR8","unstructured":"ENISA: Certificate authorities\u2013the weak link of Internet security. Info notes, September 2016. https:\/\/web.archive.org\/web\/20180527220047\/www.enisa.europa.eu\/publications\/info-notes\/certificate-authorities-the-weak-link-of-internet-security . Accessed 16 Sep 2018"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-319-49100-4_12","volume-title":"Security Standardisation Research","author":"Jonathan Katz","year":"2016","unstructured":"Katz, J.: Analysis of a proposed hash-based signature standard. In: Third International Conference on Security Standardisation Research (SSR), pp. 261\u2013273, December 2016"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Kim, T.H., Huang, L., Perrig, A., Jackson, C., Gligor, V.D.: Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure. In: 22nd International World Wide Web Conference (WWW), pp. 679\u2013690, May 2013","DOI":"10.1145\/2488388.2488448"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Kocher, P.C.: On certificate revocation and validation. In: Proceedings of the Second International Conference on Financial Cryptography (FC), pp. 172\u2013177, February 1998","DOI":"10.1007\/BFb0055481"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Laurie, B., Langley, A., Kasper, E.: Certificate transparency. RFC 6962, IETF, June 2013. https:\/\/tools.ietf.org\/html\/rfc6962","DOI":"10.17487\/rfc6962"},{"key":"11_CR13","unstructured":"Laurie, B., Langley, A., Kasper, E., Messeri, E., Stradling, R.: Certificate transparency version 2.0. Internet-draft draft-ietf-trans-rfc6962-bis-28, IETF, March 2018. https:\/\/tools.ietf.org\/html\/draft-ietf-trans-rfc6962-bis-28 , work in progress"},{"key":"11_CR14","unstructured":"Melara, M.S., Blankstein, A., Bonneau, J., Felten, E.W., Freedman, M.J.: CONIKS: Bringing key transparency to end users. In: 24th USENIX Security Symposium, pp. 383\u2013398, August 2015"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201987","author":"Ralph C. Merkle","year":"1988","unstructured":"Merkle, R.C.: A digital signature based on a conventional encryption function. In: Advances in Cryptology (CRYPTO), pp. 369\u2013378, August 1987"},{"key":"11_CR16","unstructured":"Nordberg, L., Gillmor, D.K., Ritter, T.: Gossiping in CT. Internet-draft draft-ietf-trans-gossip-05, IETF, January 2018. https:\/\/tools.ietf.org\/html\/draft-ietf-trans-gossip-05 , work in progress"},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/11535706_7","volume-title":"Data and Applications Security XIX","author":"Glen Nuckolls","year":"2005","unstructured":"Nuckolls, G.: Verified query results from hybrid authentication trees. In: Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pp. 84\u201398, August 2005"},{"key":"11_CR18","unstructured":"Sleevi, R., Messeri, E.: Certificate transparency in Chrome: Monitoring CT logs consistency. Design document, Google Inc., March 2017. https:\/\/docs.google.com\/document\/d\/1FP5J5Sfsg0OR9P4YT0q1dM02iavhi8ix1mZlZe_z-ls\/edit?pref=2&pli=1 . Accessed 16 Sep 2018"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Syta, E., et al.: Keeping authorities \u201chonest or bust\u201d with decentralized witness cosigning. In: IEEE Symposium on Security and Privacy (SP), pp. 526\u2013545, May 2016","DOI":"10.1109\/SP.2016.38"},{"key":"11_CR20","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-39658-1_2","volume-title":"Algorithms - ESA 2003","author":"Roberto Tamassia","year":"2003","unstructured":"Tamassia, R.: Authenticated data structures. In: 11th Annual European Symposium (ESA) on Algorithms, pp. 2\u20135, September 2003"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03638-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,30]],"date-time":"2019-10-30T06:15:47Z","timestamp":1572416147000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03638-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030036379","9783030036386"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03638-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"NordSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nordic Conference on Secure IT Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nordsec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securitylab.no\/nordsec18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}