{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:45:19Z","timestamp":1725770719080},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642539961"},{"type":"electronic","value":"9783642539978"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-53997-8_5","type":"book-chapter","created":{"date-parts":[[2014,1,26]],"date-time":"2014-01-26T22:44:52Z","timestamp":1390776292000},"page":"65-82","source":"Crossref","is-referenced-by-count":0,"title":["STUNT: A Simple, Transparent, User-Centered Network of Trust"],"prefix":"10.1007","author":[{"given":"Klaus","family":"Potzmader","sequence":"first","affiliation":[]},{"given":"Johannes","family":"Winter","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Hein","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/283699.283739","volume-title":"Proceedings of the 1997 Workshop on New Security Paradigms","author":"A. Abdul-Rahman","year":"1997","unstructured":"Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: Proceedings of the 1997 Workshop on New Security Paradigms, pp. 48\u201360. ACM Press, New York (1997)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Arnbak, A.M., van Eijk, N.A.N.M.: Certificate Authority Collapse - Regulating Systemic Vulnerabilities in the HTTPS Value Chain. In: Telecommunications Policy Research Conference (2012), \n                  \n                    http:\/\/www.ssrn.com\/link\/2012-TPRC.html","DOI":"10.2139\/ssrn.2031409"},{"issue":"2","key":"5_CR3","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.websem.2007.03.002","volume":"5","author":"D. Artz","year":"2007","unstructured":"Artz, D., Gil, Y.: A Survey of Trust in Computer Science and the Semantic Web. Web Sem.\u00a05(2), 58\u201371 (2007)","journal-title":"Web Sem."},{"key":"5_CR4","unstructured":"Back, A.: Hashcash - A Denial of Service Counter-Measure. Technical Report (2002)"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-642-38908-5_16","volume-title":"Trust and Trustworthy Computing","author":"S. Bartsch","year":"2013","unstructured":"Bartsch, S., Volkamer, M., Theuerling, H., Karayumak, F.: Contextualized Web Warnings, and How They Cause Distrust. In: Huth, M., Asokan, N., \u010capkun, S., Flechais, I., Coles-Kemp, L. (eds.) TRUST 2013. LNCS, vol.\u00a07904, pp. 205\u2013222. Springer, Heidelberg (2013)"},{"key":"5_CR6","first-page":"164","volume-title":"IEEE Symposium on Security and Privacy","author":"M. Blaze","year":"1996","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: IEEE Symposium on Security and Privacy, pp. 164\u2013173. IEEE Press, Washington DC (1996)"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/3-540-49135-X_9","volume-title":"6th International Workshop on Security Protocols","author":"M. Blaze","year":"1999","unstructured":"Blaze, M., Feigenbaum, J., Keromytis, A.D.: KeyNote: Trust Management for Public-Key Infrastructures. In: 6th International Workshop on Security Protocols, pp. 59\u201363. Springer, London (1999)"},{"issue":"3","key":"5_CR8","first-page":"127","volume":"2","author":"Y.-H. Chu","year":"1997","unstructured":"Chu, Y.-H., Feigenbaum, J., LaMacchia, B., Resnick, P., Strauss, M.: REFEREE: Trust Management for Web Applications. World Wide Web\u00a02(3), 127\u2013139 (1997)","journal-title":"World Wide Web"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Dang, Q., Blank, R.M., Gallagher, P.: Recommendation for Applications Using Approved Hash Algorithms. NIST Special Publication 800-107, Rev. 1. National Institute of Standards and Technology (2012)","DOI":"10.6028\/NIST.SP.800-107r1"},{"issue":"2","key":"5_CR10","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. on Inf. Theory\u00a029(2), 198\u2013207 (1983)","journal-title":"IEEE Trans. on Inf. Theory"},{"issue":"1","key":"5_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1023\/A:1011132312956","volume":"16","author":"C. Ellison","year":"2000","unstructured":"Ellison, C., Schneier, B.: Ten Risks of PKI: What You\u2019re Not Being Told About Public Key Infrastructure. Comp. Sec.\u00a016(1), 1\u20137 (2000)","journal-title":"Comp. Sec."},{"key":"5_CR12","unstructured":"European Network and Information Security Agency (ENISA): Operation Black Tulip: Certificate Authorities lose authority (2011), \n                  \n                    http:\/\/www.enisa.europa.eu\/media\/news-items\/operation-black-tulip\/view"},{"key":"5_CR13","unstructured":"Evans, C., Palmer, C., Sleevi, R.: Public Key Pinning Extension for HTTP, IETF Experimental Draft (2012), \n                  \n                    https:\/\/tools.ietf.org\/html\/draft-ietf-websec-key-pinning-04"},{"key":"5_CR14","first-page":"38","volume-title":"Computer and Communications Security","author":"M. Georgiev","year":"2012","unstructured":"Georgiev, M., Iyengar, S., Jana, S., Anubhai, R., Boneh, D., Shmatikov, V.: The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software. In: Computer and Communications Security, pp. 38\u201349. ACM Press, New York (2012)"},{"issue":"8","key":"5_CR15","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MC.2002.1023787","volume":"35","author":"P. Gutmann","year":"2002","unstructured":"Gutmann, P.: PKI: It\u2019s Not Dead, Just Resting. Computer\u00a035(8), 41\u201349 (2002)","journal-title":"Computer"},{"key":"5_CR16","unstructured":"Hoogstraaten, H., Prins, R., Niggebrugge, D., Heppener, D., Groenewegen, F., Wettinck, J., Strooy, K., Arends, P., Pols, P., Kouprie, R., Moorress, S., van Pelt, X., Zheng, H.Y.: Black Tulip - Fox-IT Report of the Investigation into the DigiNotar Certificate Authority Breach (2012), \n                  \n                    http:\/\/tinyurl.com\/942cr6h"},{"key":"5_CR17","unstructured":"ITU-T, Series X: Data Networks, Open System Communication and Security: Public-Key and attribute certificate frameworks. ITU-T Recommendation X.509 (2009)"},{"issue":"2","key":"5_CR18","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, D.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007)","journal-title":"Decision Support Systems"},{"key":"5_CR19","unstructured":"Juels, A., Brainard, B.: Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. In: Kent, S. (ed.) Network and Distributed System Security Symposium, pp. 151\u2013165 (1999)"},{"key":"5_CR20","unstructured":"Laurie, B., Langley, A., Kasper, E.: Certificate Transparency, IETF Experimental Draft (2012), \n                  \n                    https:\/\/tools.ietf.org\/html\/draft-laurie-pki-sunlight-05"},{"key":"5_CR21","unstructured":"Marlinspike, M., Perrin, T.: Trust Assertions for Certificate Keys, IETF Experimental Draft (2013), \n                  \n                    https:\/\/tools.ietf.org\/html\/draft-perrin-tls-tack-02"},{"key":"5_CR22","unstructured":"Microsoft Corporation: Windows and Windows Phone 8 SSL Root Certificate Program, Member CAs (2013), \n                  \n                    http:\/\/tinyurl.com\/c2qa5nh"},{"key":"5_CR23","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008), \n                  \n                    http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-27576-0_20","volume-title":"Financial Cryptography and Data Security","author":"C. Soghoian","year":"2012","unstructured":"Soghoian, C., Stamm, S.: Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL. In: Danezis, G. (ed.) FC 2011. LNCS, vol.\u00a07035, pp. 250\u2013259. Springer, Heidelberg (2012)"},{"key":"5_CR25","first-page":"1","volume-title":"7th Symposium on Usable Privacy and Security","author":"A. Sotirakopoulos","year":"2011","unstructured":"Sotirakopoulos, A., Hawkey, K., Beznosov, K.: On the Challenges in Usable Security Lab Studies: Lessons Learned from Replicating a Study on SSL Warnings. In: 7th Symposium on Usable Privacy and Security, pp. 1\u201318. ACM, New York (2011)"},{"key":"5_CR26","first-page":"399","volume-title":"18th USENIX Security Symposium","author":"J. Sunshine","year":"2009","unstructured":"Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., Cranor, L.F.: Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In: 18th USENIX Security Symposium, pp. 399\u2013416. USENIX Association, Berkeley (2009)"},{"key":"5_CR27","unstructured":"Thoughtcrime Labs: Convergence - an Agile, Distributed and Secure Strategy for Replacing Certificate Authorities (2013), \n                  \n                    http:\/\/www.convergence.io"},{"key":"5_CR28","first-page":"321","volume-title":"USENIX Annual Technical Conference","author":"D. Wendlandt","year":"2008","unstructured":"Wendlandt, D., Andersen, D., Perrig, A.: Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing. In: USENIX Annual Technical Conference, pp. 321\u2013334. USENIX Association, Berkeley (2008)"}],"container-title":["Lecture Notes in Computer Science","Public Key Infrastructures, Services and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-53997-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T00:49:57Z","timestamp":1558831797000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-53997-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642539961","9783642539978"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-53997-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}