Mustafa Emre Acer
|
How Chrome monitors CT logs
|
Andrew Ayer
|
Learning from Certificate Transparency Log Failures
|
Andrea Barisani, Daniele Bianco
|
Implementing transparency in UEFI boot managers
|
Giulio Berra
|
A decentralized integrity and transparency model for web applications
|
Tom Binder
|
Binary Transparency via Endorsements
|
Hayden Blauzvern
|
End-to-End Transparent Package Registries
|
Philippe Boneff, Roger Ng
|
Running production-grade logs safely with Tessera
|
Melissa Chase
|
Key Transparency: Introduction, recent results, and active research areas
|
Rasmus Dahlberg
|
silentct: A Certificate Transparency monitor that filters out the noise
|
Joe DeBlasio
|
Merkle Tree Certificates: transparency as the root of trust for the post-quantum age
|
Joe DeBlasio
|
When things go bad: real world breakage from a transparency library misconfiguration
|
Alexis Hancock
|
Transparency in Digital ID Systems
|
Martin Hutchinson
|
Verifiable Indexes for a More Usable Transparency Ecosystem
|
Dennis Jackson
|
HelioTorrent: Serving Static CT over BitTorrent
|
Billy Lau
|
Crescendo: Increasing the intensity of binary transparency in the Android ecosystem
|
Holger Levsen
|
Reproducible Builds, a very brief summary of the last 12 years and a glimpse into the future
|
Bhushan Lokhande
|
Monitoring Brand Logos through Certificate Transparency
|
Mechiel Lukkien
|
Go module notifications with gopherwatch.org, and more!
|
Brendan McMillion
|
Key Transparency / When Collusion-Based Security Fails
|
Matthew McPherrin
|
CT: Managing uptime as a CA
|
Roger Ng
|
Android Certificate Transparency
|
Elena Pagnin
|
Split-View protection in centralised transparency logs
|
Michael Rosenberg, Dennis Jackson
|
Let’s Make the Internet an App Store (but not in the dystopian way)
|
Adit Sachde
|
Confidential computing: Trusted computing in the cloud
|
Tiziano Santoro
|
ent: a protocol for distributed Content Addressable Storage
|
Fredrik Stromberg
|
Transparent transparency hardware
|