dename-writeup
Science Score: 18.0%
This score indicates how likely this project is to be science-related based on various indicators:
-
✓CITATION.cff file
Found CITATION.cff file -
○codemeta.json file
-
○.zenodo.json file
-
○DOI references
-
○Academic links in README
-
○Academic email domains
-
○Institutional organization owner
-
○JOSS paper metadata
-
○Scientific vocabulary similarity
Unable to calculate vocabulary similarity
Last synced: 7 months ago
·
JSON representation
·
Repository
Basic Info
- Host: GitHub
- Owner: andres-erbsen
- Language: TeX
- Default Branch: master
- Size: 3.76 MB
Statistics
- Stars: 1
- Watchers: 3
- Forks: 0
- Open Issues: 0
- Releases: 0
Created about 12 years ago
· Last pushed about 9 years ago
Metadata Files
Citation
Owner
- Name: Andres Erbsen
- Login: andres-erbsen
- Kind: user
- Website: https://andres.systems/
- Repositories: 56
- Profile: https://github.com/andres-erbsen
Citation (citations.bib)
@Article{EllisonSchneierPKI,
author="Carl Ellison and Bruce Schneier",
title="Ten Risks of PKI: What You're not Being Told about Public Key",
year="2004",
howpublished="\url{https://www.schneier.com/paper-pki.pdf}",
}
@Article{SchneierVerisignHacked,
author="Bruce Schneier",
title="VeriSign Hacked, Successfully and Repeatedly, in 2010",
date="2012-02-03",
howpublished="\url{https://www.schneier.com/blog/archives/2012/02/verisign_hacked.html}",
}
@Article{MozillaComodo,
author="Johnathan Nightingale, Mozilla",
title="Comodo Certificate Issue – Follow Up",
date="2011-03-25",
howpublished="\url{https://blog.mozilla.org/security/2011/03/25/comodo-certificate-issue-follow-up/}",
}
@Article{MITdotEDUhack,
title="MIT DNS hacked; traffic redirected",
howpublished="\url{http://tech.mit.edu/V132/N63/hack.html}",
date="2013-01-23",
author="Joanna Kao",
}
@Article{arsTechnicaGGreenwaldPGP,
author="Dan Goodin",
title="Guardian reporter delayed e-mailing NSA source because crypto is a pain",
date="2013-06-11",
journal="Ars Technica",
howpublished="\url{http://arstechnica.com/security/2013/06/guardian-reporter-delayed-e-mailing-nsa-source-because-crypto-is-a-pain/}",
}
@Article{wpNsaProofEncryption,
author="Timothy B. Lee",
title="NSA-proof encryption exists. Why doesn’t anyone use it?",
date="2013-06-14",
journal="The Washington Post",
howpublished="\url{http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/14/nsa-proof-encryption-exists-why-doesnt-anyone-use-it/}",
}
@Article{Johnny1999,
author="Alma Whitten and J. D. Tygar",
title="Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0",
year="1999",
journal="Proceedings of the 8th USENIX Security Symposium",
howpublished="\url{http://www.gaudior.net/alma/johnny.pdf}",
}
@Article{Johnny2008,
author="Jan Sousedek",
title="Why Johnny Can't Encrypt: A Usability Study of PGP",
year="2008",
journal="Technische Universität Berlin Internet Security Seminar",
howpublished="\url{http://www.net.t-labs.tu-berlin.de/teaching/ss08/IS_seminar/PDF/C.1.pdf}",
}
@Article{ZookosTriangle,
author="Zooko Wilcox-O'Hearn",
title="Names: Decentralized, Secure, Human-Meaningful: Choose Two",
date="2003-09-22",
howpublished="\url{http://web.archive.org/web/20120204172516/http://zooko.com/distnames.html}",
}
@Article{CertificateTransparancy,
author="Ben Laurie and Adam Langley",
title="Certificate Authority Transparency and Auditability",
date="2011-11-22",
howpublished="\url{http://www.links.org/files/CertificateAuthorityTransparencyandAuditability.pdf}",
}
@Article{daneRFC,
author="P. Hoffman and J. Schlyter",
title="RFC 6698: The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA",
date="2013-04-16",
howpublished="\url{http://datatracker.ietf.org/doc/rfc6698/?include_text=1}",
}
@Article{perspectives,
author="Dan Wendlandt", % TODO: verify this, this is from the project authors page, not the text
title="Perspectives Project",
year="2014",
howpublished="\url{http://perspectives-project.org/}",
}
@Article{convergence,
author="Moxie Marlinspike", % TODO: verify this, this is from the project authors page, not the text
title="Convergence",
year="2011",
howpublished="\url{http://convergence.io/}",
}
@Article{CryptoBook,
author="John Maheswaran and David Isaac Wolinsky and Bryan Ford",
title="Crypto-Book: An Architecture for Privacy Preserving
Online Identities",
date="2013-11-21",
journal="Hotnets",
howpublished="\url{http://www.cs.yale.edu/homes/maheswaran/hotnets.pdf}",
}
@Article{BitcoinElectricity,
author="Tim Worstall",
title="Bitcoin Mining Uses \$15 Million's Worth Of Electricity Every Day",
year="2013-12-03",
journal="Forbes",
howpublished="\url{http://www.forbes.com/sites/timworstall/2013/12/03/fascinating-number-bitcoin-mining-uses-15-millions-worth-of-electricity-every-day/}",
}
@Article{SwartzSquareZoooko,
author="Aaron Swartz",
title="Squaring the Triangle: Secure, Decentralized, Human-Readable Names",
date="2011-01-06",
howpublished="\url{http://www.aaronsw.com/weblog/squarezooko}",
}
@Article{Pond,
title="Pond",
howpublished="\url{https://pond.imperialviolet.org/}",
author="Adam Langley",
year="2013",
}
@Article{protobuf,
howpublished="\url{https://developers.google.com/protocol-buffers/docs/overview}",
title="Protocol Buffers: Developer Guide",
date="2012-04-02",
author="Google",
}
@Article{spanner,
author="James C. Corbett and Jeffrey Dean and Michael Epstein and Andrew Fikes and Christopher Frost and JJ Furman and Sanjay Ghemawat and Andrey Gubarev and Christopher Heiser and Peter Hochschild and Wilson Hsieh and Sebastian Kanthak and Eugene Kogan and Hongyi Li and Alexander Lloyd and Sergey Melnik and David Mwaura and David Nagle and Sean Quinlan and Rajesh Rao and Lindsay Rolig and Yasushi Saito and Michal Szymaniak and Christopher Taylor and Ruth Wang and Dale Woodford",
title="Spanner: Google's Globally-Distributed Database",
howpublished="\url{http://research.google.com/archive/spanner.html}",
year="2012",
}