{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:49:53Z","timestamp":1764240593844,"version":"build-2065373602"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T00:00:00Z","timestamp":1662681600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T00:00:00Z","timestamp":1662681600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,9]]},"DOI":"10.1109\/pkia56009.2022.9952249","type":"proceedings-article","created":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T21:40:50Z","timestamp":1669153250000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["Evolving Role of PKI in Facilitating Trust"],"prefix":"10.1109","author":[{"given":"Vishwas T.","family":"Patil","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Bombay,Department of Computer Science and Engineering,Mumbai,India"}]},{"given":"R.K.","family":"Shyamasundar","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Bombay,Department of Computer Science and Engineering,Mumbai,India"}]}],"member":"263","reference":[{"key":"ref39","first-page":"114","article-title":"Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL\/TLSImplementations","author":"brubaker","year":"0","journal-title":"2014 IEEE Symposium on Security and Privacy (SP) IEEE Computer Society"},{"key":"ref38","article-title":"Global Authentication in an Untrustworthy World","author":"abadi","year":"0","journal-title":"15th Workshop on Hot Topics in Operating Systems (HotOS XV) USENIX Association"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1373290.1373300"},{"key":"ref32","first-page":"109","article-title":"PKI Design for the Real World","author":"gutmann","year":"0","journal-title":"Proceedings New Security Paradigms Workshop NSPW"},{"key":"ref31","article-title":"Establishing Identity Without Certification Authorities","author":"ellison","year":"0","journal-title":"USENIX Security Symposium USENIX Association"},{"key":"ref30","first-page":"385","article-title":"Blockchain: The revolution in trust management","volume":"84","author":"shyamasundar","year":"0","journal-title":"Proceedings of the Indian National Science Academy"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352615"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504755"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485356"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/376134.376184"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663759"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1023787"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/.2006.1629442"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5280"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4210"},{"journal-title":"RFC3280 Internet X 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile","year":"2002","author":"housley","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8527010"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2983022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0052"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00039"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/11961635_12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2013.27"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2000.856921"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00015"},{"key":"ref6","first-page":"833","article-title":"Bam-boozling Certificate Authorities with BGP","author":"birge-lee","year":"0","journal-title":"USENIX Security Symposium USENIX Association"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2975591"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23305"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3278516"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/BF02706242"},{"key":"ref9","first-page":"1","article-title":"Ten Risks of PKI: What You're not Being Told about Public Key Infrastructure","volume":"16","author":"ellison","year":"2000","journal-title":"Computers and Security Journal"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7469"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16441-5_3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5755"},{"journal-title":"Certificate Discovery Using SPKI\/SDSI 2 0 Certificates","year":"1998","author":"elien","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2693"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6844"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6698"}],"event":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","start":{"date-parts":[[2022,9,9]]},"location":"Bangalore, India","end":{"date-parts":[[2022,9,10]]}},"container-title":["2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9952187\/9952209\/09952249.pdf?arnumber=9952249","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:58:35Z","timestamp":1670875115000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9952249\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,9]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/pkia56009.2022.9952249","relation":{},"subject":[],"published":{"date-parts":[[2022,9,9]]}}}