Layered Analysis of Security Ceremonies, IFIP Advances in Inf. and Communication Technology, pp.273-286, 2012. ,
DOI : 10.1007/978-3-642-30436-1_23
Browser interfaces and extended validation SSL certificates, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pp.19-30, 2009. ,
DOI : 10.1145/1655008.1655012
The Transport Layer Security (TLS) Protocol Version 1.2, p.5246, 2008. ,
DOI : 10.17487/rfc5246
Ceremony design and analysis. IACR eprint archive pp, pp.1-17, 2007. ,
Communicating sequential processes, Communications of the ACM, vol.21, issue.8, pp.666-677, 1978. ,
DOI : 10.1145/359576.359585
PAT: Towards Flexible Verification under Fairness, Proc. of CAV'09, pp.709-714, 2009. ,
DOI : 10.1007/978-3-642-02658-4_59
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.151.806
Crying wolf: An empirical study of SSL warning effectiveness, Proc. of USENIX'09, 2009. ,