Table 1: Strengths and weaknesses of surveyed approaches. Entries underlined represent major disadvantage of the corresponding scheme.


MitM attack mitigation×
Domain key recovery×
Client connection privacy××
Domain certificate revocation×
Efficient certificate revocation proof×××××
Intermediate CA discovery××××××
CA certificate revocation××××××