Show simple item record

dc.contributor.authorAlsaid, Adil
dc.contributor.authorMitchell, Chris J.
dc.contributor.editorWulf, Christopher
dc.contributor.editorLucks, Stefan
dc.contributor.editorYau, Po-Wah
dc.date.accessioned2019-08-26T12:42:21Z
dc.date.available2019-08-26T12:42:21Z
dc.date.issued2005
dc.identifier.isbn3-88579-403-9
dc.identifier.issn1617-5468
dc.identifier.urihttp://dl.gi.de/handle/20.500.12116/24849
dc.description.abstractAs has recently been demonstrated, a malicious third party could insert a self-issued CA public key into the list of trusted root CA public keys stored on an end user PC. As a consequence, the malicious third party could potentially do severe damage to the end user computing environment. In this paper, we discuss the problem of fake root public keys and suggest a solution that can be used to detect and remove them. We further describe a prototype implementation of this solution.en
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofWEWoRC 2005 – Western European Workshop on Research in Cryptology
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-74
dc.titleA scanning tool for PC root public key storesen
dc.typeText/Conference Paper
dc.pubPlaceBonn
mci.reference.pages45-52
mci.conference.sessiontitleRegular Research Papers
mci.conference.locationLeuven, Belgium
mci.conference.date5.-7. July 2005


Files in this item

Thumbnail

Show simple item record