{"id":"https://openalex.org/W2990503390","doi":"https://doi.org/10.1145/3359789.3359800","title":"Will you trust this TLS certificate?","display_name":"Will you trust this TLS certificate?","publication_year":2019,"publication_date":"2019-11-22","ids":{"openalex":"https://openalex.org/W2990503390","doi":"https://doi.org/10.1145/3359789.3359800","mag":"2990503390"},"language":"en","primary_location":{"id":"doi:10.1145/3359789.3359800","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3359789.3359800","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062736040","display_name":"Martin Ukrop","orcid":"https://orcid.org/0000-0001-8110-8926"},"institutions":[{"id":"https://openalex.org/I21449261","display_name":"Masaryk University","ror":"https://ror.org/02j46qs45","country_code":"CZ","type":"education","lineage":["https://openalex.org/I21449261"]}],"countries":["CZ"],"is_corresponding":true,"raw_author_name":"Martin Ukrop","raw_affiliation_strings":["Masaryk University, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Masaryk University, Czech Republic","institution_ids":["https://openalex.org/I21449261"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024882020","display_name":"Lydia Kraus","orcid":"https://orcid.org/0000-0002-1387-3578"},"institutions":[{"id":"https://openalex.org/I21449261","display_name":"Masaryk University","ror":"https://ror.org/02j46qs45","country_code":"CZ","type":"education","lineage":["https://openalex.org/I21449261"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Lydia Kraus","raw_affiliation_strings":["Masaryk University, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Masaryk University, Czech Republic","institution_ids":["https://openalex.org/I21449261"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089620979","display_name":"Vashek Maty\u00e1\u0161","orcid":"https://orcid.org/0000-0001-7957-7694"},"institutions":[{"id":"https://openalex.org/I21449261","display_name":"Masaryk University","ror":"https://ror.org/02j46qs45","country_code":"CZ","type":"education","lineage":["https://openalex.org/I21449261"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Vashek Matyas","raw_affiliation_strings":["Masaryk University, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Masaryk University, Czech Republic","institution_ids":["https://openalex.org/I21449261"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001717373","display_name":"Heider A. Wahsheh","orcid":"https://orcid.org/0000-0003-2908-5418"},"institutions":[{"id":"https://openalex.org/I149461666","display_name":"Ca' Foscari University of Venice","ror":"https://ror.org/04yzxz566","country_code":"IT","type":"education","lineage":["https://openalex.org/I149461666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Heider Ahmad Mutleq Wahsheh","raw_affiliation_strings":["Ca' Foscari University of Venice, Venice, Italy"],"affiliations":[{"raw_affiliation_string":"Ca' Foscari University of Venice, Venice, Italy","institution_ids":["https://openalex.org/I149461666"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5062736040"],"corresponding_institution_ids":["https://openalex.org/I21449261"],"apc_list":null,"apc_paid":null,"fwci":1.4148,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.83958068,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"718","last_page":"731"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.7238919734954834},{"id":"https://openalex.org/keywords/documentation","display_name":"Documentation","score":0.7002205848693848},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.691683292388916},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6903464794158936},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6425153017044067},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5426937937736511},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5368988513946533},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.5306056141853333},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3449789881706238},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.2128967046737671},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.07821530103683472},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.0681518018245697}],"concepts":[{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.7238919734954834},{"id":"https://openalex.org/C56666940","wikidata":"https://www.wikidata.org/wiki/Q788790","display_name":"Documentation","level":2,"score":0.7002205848693848},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.691683292388916},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6903464794158936},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6425153017044067},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5426937937736511},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5368988513946533},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.5306056141853333},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3449789881706238},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.2128967046737671},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.07821530103683472},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0681518018245697},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3359789.3359800","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3359789.3359800","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1800552373","https://openalex.org/W1803273808","https://openalex.org/W1990857471","https://openalex.org/W1995989152","https://openalex.org/W2001637908","https://openalex.org/W2008107570","https://openalex.org/W2022302485","https://openalex.org/W2025945315","https://openalex.org/W2116876232","https://openalex.org/W2129830111","https://openalex.org/W2130867912","https://openalex.org/W2139179587","https://openalex.org/W2145994642","https://openalex.org/W2146752727","https://openalex.org/W2157337727","https://openalex.org/W2159165123","https://openalex.org/W2164777277","https://openalex.org/W2511044583","https://openalex.org/W2550748725","https://openalex.org/W2698406033","https://openalex.org/W2750778058","https://openalex.org/W2755252385","https://openalex.org/W2774698839","https://openalex.org/W2786284130","https://openalex.org/W2790370416","https://openalex.org/W2889665541","https://openalex.org/W2909986196","https://openalex.org/W2914982603","https://openalex.org/W3105794999","https://openalex.org/W4298051233","https://openalex.org/W4299818415"],"related_works":["https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W4229499248","https://openalex.org/W2618286804","https://openalex.org/W2566006169","https://openalex.org/W1567818861","https://openalex.org/W2987774938","https://openalex.org/W4256492088","https://openalex.org/W2329643025","https://openalex.org/W632915154"],"abstract_inverted_index":{"Flawed":[0],"TLS":[1],"certificates":[2,49],"are":[3],"not":[4],"uncommon":[5],"on":[6,34],"the":[7,32,70],"Internet.":[8],"While":[9],"they":[10,18],"signal":[11],"a":[12,38],"potential":[13],"issue,":[14],"in":[15],"most":[16],"cases":[17],"have":[19],"benign":[20],"causes":[21],"(e.g.,":[22],"misconfiguration":[23],"or":[24,40],"even":[25,53],"deliberate":[26],"deployment).":[27],"This":[28],"adds":[29],"fuzziness":[30],"to":[31,36],"decision":[33],"whether":[35],"trust":[37],"connection":[39],"not.":[41],"Little":[42],"is":[43,65],"known":[44],"about":[45],"perceptions":[46],"of":[47,60,72],"flawed":[48],"by":[50],"IT":[51],"professionals,":[52],"though":[54],"their":[55],"decisions":[56],"impact":[57],"high":[58],"numbers":[59],"end":[61],"users.":[62],"Moreover,":[63],"it":[64],"unclear":[66],"how":[67],"much":[68],"does":[69],"content":[71],"error":[73],"messages":[74],"and":[75],"documentation":[76],"influence":[77],"these":[78],"perceptions.":[79]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
