{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T18:10:29Z","timestamp":1763748629710,"version":"3.40.3"},"publisher-location":"Cham","reference-count":82,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030987848"},{"type":"electronic","value":"9783030987855"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-98785-5_3","type":"book-chapter","created":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T05:02:34Z","timestamp":1647838954000},"page":"50-80","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Changing of\u00a0the\u00a0Guards: Certificate and\u00a0Public Key Management on\u00a0the\u00a0Internet"],"prefix":"10.1007","author":[{"given":"Carl Magnus","family":"Bruhner","sequence":"first","affiliation":[]},{"given":"Oscar","family":"Linnarsson","sequence":"additional","affiliation":[]},{"given":"Matus","family":"Nemec","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Arlitt","sequence":"additional","affiliation":[]},{"given":"Niklas","family":"Carlsson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,22]]},"reference":[{"key":"3_CR1","unstructured":"Marking HTTP as Non-secure. https:\/\/www.chromium.org\/Home\/chromium-security\/marking-http-as-non-secure"},{"key":"3_CR2","unstructured":"Project Sonar. https:\/\/www.rapid7.com\/research\/project-sonar\/"},{"key":"3_CR3","unstructured":"SSL Certificates - Rapid7 Open Data. https:\/\/opendata.rapid7.com\/sonar.ssl\/"},{"key":"3_CR4","unstructured":"Scanning All the Things (2013). https:\/\/blog.rapid7.com\/2013\/09\/26\/internet-wide-probing-rapid7-sonar\/"},{"key":"3_CR5","unstructured":"Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates (2020). https:\/\/cabforum.org\/wp-content\/uploads\/CA-Browser-Forum-BR-1.7.0.pdf"},{"key":"3_CR6","unstructured":"Chrome root program (2020). https:\/\/www.chromium.org\/Home\/chromium-security\/root-ca-policy"},{"key":"3_CR7","unstructured":"Guidelines for the Issuance and Management of Extended Validation Certificates (2020). https:\/\/cabforum.org\/wp-content\/uploads\/CA-Browser-Forum-EV-Guidelines-v1.7.2.pdf"},{"key":"3_CR8","unstructured":"Aas, J.: Why ninety-day lifetimes for certificates? (2015). https:\/\/letsencrypt.org\/2015\/11\/09\/why-90-days.html"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Aas, J., et al.: Let\u2019s encrypt: an automated certificate authority to encrypt the entire web. In: Proceedings of the ACM CCS (2019)","DOI":"10.1145\/3319535.3363192"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Acer, M.E., et al.: Where the wild warnings are: root causes of Chrome HTTPS certificate errors. In: Proceedings of the ACM CCS (2017)","DOI":"10.1145\/3133956.3134007"},{"key":"3_CR11","unstructured":"Antonakakis, M., et al.: Understanding the Mirai botnet. In: Proceedings of the USENIX Security (2017)"},{"key":"3_CR12","unstructured":"Apple: About upcoming limits on trusted certificates, March 2020. https:\/\/support.apple.com\/en-us\/HT211025. Accessed Jan 2021"},{"key":"3_CR13","unstructured":"Apple: Apple\u2019s Certificate Transparency policy (2020). https:\/\/support.apple.com\/en-us\/HT205280. Accessed Jan 2020"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Bano, S., et al.: Scanning the internet for liveness. SIGCOMM Comput. Commun. Rev. (2), 2\u20139 (2018)","DOI":"10.1145\/3213232.3213234"},{"key":"3_CR15","unstructured":"Barnes, R., Iyengar, S., Sullivan, N., Rescorla, E.: Delegated Credentials for TLS. Internet Draft, June 2020. https:\/\/tools.ietf.org\/html\/draft-ietf-tls-subcerts-09"},{"key":"3_CR16","unstructured":"Barnes, R.: Deprecating Non-Secure HTTP (2015). https:\/\/blog.mozilla.org\/security\/2015\/04\/30\/deprecating-non-secure-http\/"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Barnes, R., Hoffman-Andrews, J., McCarney, D., Kasten, J.: Automatic Certificate Management Environment (ACME). RFC 8555, March 2019","DOI":"10.17487\/RFC8555"},{"issue":"3","key":"3_CR18","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TDSC.2016.2601610","volume":"15","author":"D Basin","year":"2016","unstructured":"Basin, D., Cremers, C., Kim, T.H.J., Perrig, A., Sasse, R., Szalachowski, P.: Design, analysis, and implementation of ARPKI: an attack-resilient public-key infrastructure. IEEE Trans. Dependable Secure Comput. 15(3), 393\u2013408 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Berkowsky, J.A., Hayajneh, T.: Security issues with certificate authorities. In: Proceedings of the IEEE UEMCON (2017)","DOI":"10.1109\/UEMCON.2017.8249081"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Bernhard, M., Sharman, J., Acemyan, C.Z., Kortum, P., Wallach, D.S., Halderman, J.A.: On the usability of HTTPS deployment. In: Proceedings of the CHI (2019)","DOI":"10.1145\/3290605.3300540"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Boureanu, I., Fouque, P.A., Onete, C., Richard, B.: Content delivery over TLS: a cryptographic analysis of keyless SSL. In: Proceedings of the IEEE Euro S&P (2017)","DOI":"10.1109\/EuroSP.2017.52"},{"key":"3_CR22","unstructured":"Boeyen, S., Santesson, S., Polk, T., Housley, R., Farrell, S., Cooper, D.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280, RFC Editor, May 2008"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Borgolte, K., Fiebig, T., Hao, S., Kruegel, C., Vigna, G.: Cloud strife: mitigating the security risks of domain-validated certificates (2018)","DOI":"10.1145\/3232755.3232859"},{"key":"3_CR24","unstructured":"CA\/Browser Forum: Ballot SC6 - revocation timeline extension (2018). https:\/\/cabforum.org\/2018\/09\/14\/ballot-sc6-revocation-timeline-extension"},{"key":"3_CR25","unstructured":"CA\/Browser Forum: Ballot SC 31: Browser alignment (2020). https:\/\/cabforum.org\/2020\/07\/16\/ballot-sc31-browser-alignment\/"},{"key":"3_CR26","unstructured":"CA\/Browser Forum: Baseline requirements documents (2021). https:\/\/cabforum.org\/baseline-requirements-documents\/"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Cangialosi, F., et al.: Measurement and analysis of private key sharing in the https ecosystem. In: Proceedings of the ACM CCS (2016)","DOI":"10.1145\/2976749.2978301"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Chuat, L., Abdou, A., Sasse, R., Sprenger, C., Basin, D., Perrig, A.: SoK: delegation and revocation, the missing links in the web\u2019s chain of trust. In: Proceedings of the IEEE Euro S&P (2020)","DOI":"10.1109\/EuroSP48549.2020.00046"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Chung, T., et al.: Measuring and applying invalid SSL certificates: the silent majority. In: Proceedings of the IMC (2016)","DOI":"10.1145\/2987443.2987454"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Chung, T., et al.: Is the web ready for OCSP must-staple? In: Proceedings of the IMC (2018)","DOI":"10.1145\/3278532.3278543"},{"key":"3_CR31","unstructured":"Cimpanu, C.: Apple strong-arms entire CA industry into one-year certificate lifespans, June 2020. https:\/\/www.zdnet.com\/article\/apple-strong-arms-entire-ca-industry-into-one-year-certificate-lifespans\/. Accessed Jan 2021"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Dickinson, L., Smith, T., Seamons, K.: Leveraging locality of reference for certificate revocation. In: Proceedings of the ACSAC (2019)","DOI":"10.1145\/3359789.3359819"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., Adrian, D., Mirian, A., Bailey, M., Halderman, J.A.: A search engine backed by internet-wide scanning. In: Proceedings of the ACM CCS (2015)","DOI":"10.1145\/2810103.2813703"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., et al.: The matter of heartbleed. In: Proceedings of the IMC (2014)","DOI":"10.1145\/2663716.2663755"},{"key":"3_CR35","unstructured":"Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: Proceedings of the USENIX Security (2013)"},{"key":"3_CR36","doi-asserted-by":"publisher","unstructured":"Eskandarian, S., Messeri, E., Bonneau, J., Boneh, D.: Certificate transparency with privacy, vol. 2017, pp. 329\u2013344 (2017). https:\/\/doi.org\/10.1515\/popets-2017-0052","DOI":"10.1515\/popets-2017-0052"},{"key":"3_CR37","unstructured":"Felt, A.P., Barnes, R., King, A., Palmer, C., Bentzel, C., Tabriz, P.: Measuring HTTPS adoption on the web. In: Proceedings of the USENIX Security (2017)"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Fu, P., Li, Z., Xiong, G., Cao, Z., Kang, C.: SSL\/TLS security exploration through X.509 certificate\u2019s life cycle measurement. In: Proceedings of the IEEE ISCC (2018)","DOI":"10.1109\/ISCC.2018.8538533"},{"key":"3_CR39","unstructured":"Galperin, S., Adams, D.C., Myers, M., Ankney, R., Malpani, A.N.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. RFC 2560, RFC Editor, March 1999"},{"key":"3_CR40","unstructured":"Google: Certificate lifetimes (2020). https:\/\/chromium.googlesource.com\/chromium\/src\/+\/master\/net\/docs\/certificate_lifetimes.md. Accessed Jan 2021"},{"key":"3_CR41","unstructured":"Google: CRLSets (The Chromium Projects) (2020). https:\/\/dev.chromium.org\/Home\/chromium-security\/crlsets"},{"key":"3_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-54328-4_7","volume-title":"Passive and Active Measurement","author":"J Gustafsson","year":"2017","unstructured":"Gustafsson, J., Overier, G., Arlitt, M., Carlsson, N.: A first look at the CT landscape: certificate transparency logs in practice. In: Kaafar, M.A., Uhlig, S., Amann, J. (eds.) PAM 2017. LNCS, vol. 10176, pp. 87\u201399. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-54328-4_7"},{"key":"3_CR43","unstructured":"Guzman, A., Nekritz, K., Iyengar, S.: Delegated credentials: improving the security of TLS certificates. Facebook blog, November 2019. https:\/\/engineering.fb.com\/2019\/11\/01\/security\/delegated-credentials\/"},{"key":"3_CR44","doi-asserted-by":"crossref","unstructured":"Josefsson, S., Leonard, S.: Textual Encodings of PKIX, PKCS, and CMS Structures. RFC 7468, April 2015","DOI":"10.17487\/RFC7468"},{"key":"3_CR45","unstructured":"Korzhitskii, N., Carlsson, N.: Characterizing the root landscape of certificate transparency logs. In: Proceedings of the IFIP Networking (2020)"},{"key":"3_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-030-72582-2_11","volume-title":"Passive and Active Measurement","author":"N Korzhitskii","year":"2021","unstructured":"Korzhitskii, N., Carlsson, N.: Revocation statuses on the internet. In: Hohlfeld, O., Lutu, A., Levin, D. (eds.) PAM 2021. LNCS, vol. 12671, pp. 175\u2013191. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-72582-2_11"},{"key":"3_CR47","doi-asserted-by":"crossref","unstructured":"Kumar, D., et al.: Tracking certificate misissuance in the wild. In: Proceedings of the IEEE S&P (2018)","DOI":"10.1109\/SP.2018.00015"},{"key":"3_CR48","doi-asserted-by":"crossref","unstructured":"Langley, A., et al.: The QUIC transport protocol: design and internet-scale deployment. In: Proceedings of the ACM SIGCOMM (2017)","DOI":"10.1145\/3098822.3098842"},{"key":"3_CR49","doi-asserted-by":"crossref","unstructured":"Larisch, J., Choffnes, D., Levin, D., Maggs, B.M., Mislove, A., Wilson, C.: CRLite: a scalable system for pushing all TLS revocations to all browsers. In: Proceedings of the IEEE S&P (2017)","DOI":"10.1109\/SP.2017.17"},{"issue":"10","key":"3_CR50","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/2659897","volume":"57","author":"B Laurie","year":"2014","unstructured":"Laurie, B.: Certificate transparency. Commun. ACM 57(10), 40\u201346 (2014)","journal-title":"Commun. ACM"},{"key":"3_CR51","doi-asserted-by":"crossref","unstructured":"Laurie, B., Langley, A., Kasper, E.: Certificate Transparency. RFC 6962 (2013)","DOI":"10.17487\/rfc6962"},{"issue":"5","key":"3_CR52","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.comnet.2005.01.006","volume":"48","author":"C Lesniewski-Laas","year":"2005","unstructured":"Lesniewski-Laas, C., Kaashoek, M.F.: SSL splitting: securely serving data from untrusted caches. Comput. Netw. 48(5), 763\u2013779 (2005)","journal-title":"Comput. Netw."},{"key":"3_CR53","doi-asserted-by":"crossref","unstructured":"Liang, J., Jiang, J., Duan, H., Li, K., Wan, T., Wu, J.: When https meets CDN: a case of authentication in delegated service. In: Proceedings of the IEEE S&P (2014)","DOI":"10.1109\/SP.2014.12"},{"key":"3_CR54","doi-asserted-by":"crossref","unstructured":"Linn, J.: Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures. RFC 1421, February 1993","DOI":"10.17487\/rfc1421"},{"key":"3_CR55","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: An end-to-end measurement of certificate revocation in the web\u2019s PKI. In: Proceedings of the IMC (2015)","DOI":"10.1145\/2815675.2815685"},{"key":"3_CR56","doi-asserted-by":"crossref","unstructured":"Ma, Z., Austgen, J., Mason, J., Durumeric, Z., Bailey, M.: Tracing your roots: exploring the TLS trust anchor ecosystem. In: Proceedings of the IMC (2021)","DOI":"10.1145\/3487552.3487813"},{"key":"3_CR57","unstructured":"Markham, G.: Mailing list: Mozilla dev.sec.policy: Procert decision (2017). https:\/\/groups.google.com\/g\/mozilla.dev.security.policy\/c\/Ymrpsm7s5_I"},{"key":"3_CR58","unstructured":"Mirian, A., Thompson, C., Savage, S., Voelker, G.M., Felt, A.P.: HTTPS adoption in the longtail. Technical report, Google and UC San Diego (2018). https:\/\/research.google\/pubs\/pub49037\/"},{"key":"3_CR59","unstructured":"Mozilla: OneCRL (CA\/Revocation Checking in Firefox) (2020). https:\/\/wiki.mozilla.org\/CA:RevocationPlan#OneCRL"},{"key":"3_CR60","doi-asserted-by":"crossref","unstructured":"Murdock, A., Li, F., Bramsen, P., Durumeric, Z., Paxson, V.: Target generation for internet-wide IPv6 scanning. In: Proceedings of the IMC (2017)","DOI":"10.1145\/3131365.3131405"},{"key":"3_CR61","doi-asserted-by":"crossref","unstructured":"Nemec, M., Klinec, D., Svenda, P., Sekan, P., Matyas, V.: Measuring popularity of cryptographic libraries in internet-wide scans. In: Proceedings of the ACSAC (2017)","DOI":"10.1145\/3134600.3134612"},{"key":"3_CR62","unstructured":"Nir, Y., Fossati, T., Sheffer, Y., Eckert, T.: Considerations for using short term certificates. Technical report\/Internet-Draft, March 2018. https:\/\/tools.ietf.org\/id\/draft-nir-saag-star-01.html"},{"key":"3_CR63","unstructured":"O\u2019Brien, D.: Certificate Transparency Enforcement in Chrome and CT Day in London (2018). https:\/\/groups.google.com\/a\/chromium.org\/d\/msg\/ct-policy\/Qqr59r6yn1A\/2t0bWblZBgAJ. Accessed Jan 2020"},{"key":"3_CR64","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-030-72582-2_10","volume-title":"Passive and Active Measurement","author":"O Omolola","year":"2021","unstructured":"Omolola, O., Roberts, R., Ashiq, M.I., Chung, T., Levin, D., Mislove, A.: Measurement and analysis of automated certificate reissuance. In: Hohlfeld, O., Lutu, A., Levin, D. (eds.) PAM 2021. LNCS, vol. 12671, pp. 161\u2013174. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-72582-2_10"},{"key":"3_CR65","unstructured":"O\u2019Brien, D., Sleevi, R., Whalley, A.: Chrome\u2019s plan to distrust symantec certificates. Google Security Blog, September 2017. https:\/\/security.googleblog.com\/2017\/09\/chromes-plan-to-distrust-symantec.html"},{"key":"3_CR66","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/BFb0055482","volume-title":"Financial Cryptography","author":"RL Rivest","year":"1998","unstructured":"Rivest, R.L.: Can we eliminate certificate revocation lists? In: Hirchfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 178\u2013183. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0055482"},{"key":"3_CR67","unstructured":"Sander, R.: What is a code signing certificate? how does it work? IEEE Computer Society (2021). https:\/\/www.computer.org\/publications\/tech-news\/trends\/what-is-a-code-signing-certificate"},{"key":"3_CR68","unstructured":"Schechter, E.: A secure web is here to stay (2018). https:\/\/security.googleblog.com\/2018\/02\/a-secure-web-is-here-to-stay.html"},{"key":"3_CR69","doi-asserted-by":"crossref","unstructured":"Scheitle, Q., et al.: The rise of certificate transparency and its implications on the internet ecosystem. In: Proceedings of the IMC (2018)","DOI":"10.1145\/3278532.3278562"},{"key":"3_CR70","doi-asserted-by":"crossref","unstructured":"Serrano, N., Hadan, H., Camp, L.J.: A complete study of PKI (PKI\u2019s known incidents). Available at SSRN 3425554 (2019)","DOI":"10.2139\/ssrn.3425554"},{"key":"3_CR71","doi-asserted-by":"crossref","unstructured":"Sheffer, Y., Lopez, D., de Dios, O.G., Perales, A.P., Fossati, T.: Support for short-term, automatically renewed (STAR) certificates in the automated certificate management environment (ACME). RFC 8739, March 2020","DOI":"10.17487\/RFC8739"},{"key":"3_CR72","doi-asserted-by":"crossref","unstructured":"Smith, T., Dickinson, L., Seamons, K.: Let\u2019s revoke: scalable global certificate revocation. In: Proceedings of the NDSS (2020)","DOI":"10.14722\/ndss.2020.24084"},{"key":"3_CR73","unstructured":"Spotter, C.: Certificate transparency log growth (2021). https:\/\/sslmate.com\/labs\/ct_growth\/. Accessed Jan 2021"},{"key":"3_CR74","unstructured":"Stark, E., Huang, L.S., Israni, D., Jackson, C., Boneh, D.: The case for prefetching and prevalidating TLS server certificates. In: Proceedings of the NDSS (2012)"},{"key":"3_CR75","doi-asserted-by":"crossref","unstructured":"Tiefenau, C., von Zezschwitz, E., H\u00e4ring, M., Krombholz, K., Smith, M.: A usability evaluation of let\u2019s encrypt and certbot: usable security done right. In: Proceedings of the ACM CCS (2019)","DOI":"10.1145\/3319535.3363220"},{"key":"3_CR76","unstructured":"Topalovic, E., Saeta, B., Huang, L.S., Jackson, C., Boneh, D.: Towards short-lived certificates. In: Proceedings of the IEEE W2SP (2012)"},{"key":"3_CR77","doi-asserted-by":"crossref","unstructured":"Tuecke, S., Welch, V., Engert, D., Pearlman, L., Thompson, M.: Internet X.509 public key infrastructure (PKI) proxy certificate profile. RFC 3820 (2004)","DOI":"10.17487\/rfc3820"},{"key":"3_CR78","doi-asserted-by":"crossref","unstructured":"VanderSloot, B., Amann, J., Bernhard, M., Durumeric, Z., Bailey, M., Halderman, J.A.: Towards a complete view of the certificate ecosystem. In: Proceedings of the IMC (2016)","DOI":"10.1145\/2987443.2987462"},{"key":"3_CR79","doi-asserted-by":"crossref","unstructured":"Wan, G., et al.: On the origin of scanning: the impact of location on internet-wide scans. In: Proceedings of the IMC (2020)","DOI":"10.1145\/3419394.3424214"},{"key":"3_CR80","unstructured":"Welch, V., et al.: X. 509 proxy certificates for dynamic delegation. In: Proceedings of the Annual PKI R&D Workshop (2004)"},{"key":"3_CR81","unstructured":"Wilson, B.: Reducing TLS Certificate Lifespans to 398 Days. Mozilla Security Blog, July 2020. https:\/\/blog.mozilla.org\/security\/2020\/07\/09\/reducing-tls-certificate-lifespans-to-398-days\/. Accessed Jan 2021"},{"key":"3_CR82","doi-asserted-by":"crossref","unstructured":"Zhang, L., et al.: Analysis of SSL certificate reissues and revocations in the wake of heartbleed. In: Proceedings of the IMC (2014)","DOI":"10.1145\/2663716.2663758"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-98785-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,23]],"date-time":"2022-03-23T00:59:29Z","timestamp":1647997169000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-98785-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030987848","9783030987855"],"references-count":82,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-98785-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"22 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Passive and Active Network Measurement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 March 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 March 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pam2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pam2022.nl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}