{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T19:49:47Z","timestamp":1757706587733,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319543277"},{"type":"electronic","value":"9783319543284"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-54328-4_7","type":"book-chapter","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T11:01:47Z","timestamp":1487242907000},"page":"87-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["A First Look at the CT Landscape: Certificate Transparency Logs in Practice"],"prefix":"10.1007","author":[{"given":"Josef","family":"Gustafsson","sequence":"first","affiliation":[]},{"given":"Gustaf","family":"Overier","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Arlitt","sequence":"additional","affiliation":[]},{"given":"Niklas","family":"Carlsson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,17]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Akhawe, D., Amann, B., Vallentin, M., Sommer, R.: Here\u2019s my cert, so trust me, maybe?: understanding TLS errors on the web. In: Proceeding of WWW (2013)","DOI":"10.1145\/2488388.2488395"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Amann, B., Sommer, R., Vallentin, M., Hall, S.: No attack necessary: the surprising dynamics of SSL trust relationships. In: Proceeding of ACSAC (2013)","DOI":"10.1145\/2523649.2523665"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Beurdouche, B., et al.: A messy state of the union: Taming the composite state machines of TLS. In: Proceeding of IEEE S&P (2015)","DOI":"10.1109\/SP.2015.39"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Barker, E., Barker, W., Burr, W.P.W., Smid, M.: Recommendation for key management, part 1: General (rev. 3). NIST Special. Publication 800\u201357 (2012)","DOI":"10.6028\/NIST.SP.800-57p1r3"},{"key":"7_CR5","unstructured":"Basin, D., Cremers, C., Kim, T.H.-J., Perrig, A., Sasse, R., Szalachowski, P.: Arpki: Attack resilient public-key infrastructure. In: Proceeding of ACM CCS (2014)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Chuat, L., Szalachowski, P., Perrig, A., Laurie, B., Messeri, E.: Efficient gossip protocols for verifying the consistency of certificate logs. In: Proceeding of IEEE CNS (2015)","DOI":"10.1109\/CNS.2015.7346853"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Adrian, D., et al.: Imperfect forward secrecy: how Diffie-Hellman fails in practice. In: Proceeding of ACM CCS (2015)","DOI":"10.1145\/2810103.2813707"},{"key":"7_CR8","unstructured":"Duncan, R.: How certificate revocation (doesn\u2019t) work in practice (2013)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., Kasten, J., Bailey, M., Halderman, J.A.: Analysis of the HTTPS certificate ecosystem. In: Proceeding of IMC (2013)","DOI":"10.1145\/2504730.2504755"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Fadai, T., Schrittwieser, S., Kieseberg, P., Mulazzani, M.: Trust me, I\u2019m a root CA! Analyzing SSL root CAs in modern browsers and operating systems. In: Proceeding of ARES (2015)","DOI":"10.1109\/ARES.2015.93"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Hallam-Baker, P., Stradling, R.: RFC6844: DNS Certification Authority Authorization (CAA) Resource Record. IETF (2013)","DOI":"10.17487\/rfc6844"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Hoffman, P., Schlyter, J.: RFC6698: The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA. IETF (2012)","DOI":"10.17487\/rfc6698"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Huang, L., Rice, A., Ellingsen, E., Jackson, C.: Analyzing forged SSL certificates in the wild. In: Proceeding of IEEE S&P (2014)","DOI":"10.1109\/SP.2014.13"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Kim, T.H.-J., Huang, L.-S., Perrig, A., Jackson, C., Gligor, V.: Accountable key infrastructure (AKI): A proposal for a public-key validation infrastructure. In: Proceeding of WWW (2013)","DOI":"10.1145\/2488388.2488448"},{"key":"7_CR15","unstructured":"Laurie, B.: Improving the security of EV certificates (2015)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Laurie, B., K\u00e4sper, E.: Revocation transparency. Google Research, September 2012","DOI":"10.17487\/rfc6962"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Laurie, B., Langley, A., K\u00e4sper, E.: RFC6962: Certificate Transparency. IETF (2013)","DOI":"10.17487\/rfc6962"},{"key":"7_CR18","unstructured":"Laurie, B., Langley, A., K\u00e4sper, E., Messeri, E., Stradling, R.: RFC6962-bis: Certificate Transparency draft-ietf-trans-rfc6962-bis-10. IETF (2015)"},{"key":"7_CR19","unstructured":"Melara, M., Blankstein, A., Bonneau, J., Felten, E., Freedman, M.: Coniks: Bringing key transparency to end users. In: Proceeding of USENIX Security (2015)"},{"key":"7_CR20","unstructured":"Merkle, R.: Merkle Tree Patent, US4309569A (1979)"},{"key":"7_CR21","unstructured":"Nordberg, L., Gillmor, D.K., Ritter, T.: Gossiping in CT. IETF (2015)"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Ouvrier, G., Laterman, M., Arlitt, M., Carlsson, N.: Characterizing the HTTPS trust landscape: a passive view from the edge. Technical report (2016)","DOI":"10.1109\/MCOM.2017.1600981"},{"key":"7_CR23","unstructured":"Sleevi, R.: Sustaining digital certificate security, Google Security Blog, 28 October 2015. https:\/\/security.googleblog.com\/2015\/10\/sustaining-digital-certificate-security.html"},{"key":"7_CR24","unstructured":"Wendlandt, D., Andersen, D.G., Perrig, A.: Perspectives: improving SSH-style host authentication with multi-path probing. In: Proceeding of USENIX ATC (2008)"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: An end-to-end measurement of certificate revocation in the web\u2019s PKI. In: Proceeding of IMC (2015)","DOI":"10.1145\/2815675.2815685"},{"key":"7_CR26","unstructured":"Zhang, D., Gillmor, D.K., He, D., Sarikaya, B.: CT for Binary Codes. IETF (2015)"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-54328-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:00:35Z","timestamp":1709830835000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-54328-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319543277","9783319543284"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-54328-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"17 February 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Passive and Active Network Measurement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 March 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 March 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pam2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/research.csiro.au\/pam2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}