메뉴 건너뛰기




Volumn 93, Issue , 2005, Pages 13-24

Johnny 2: A user test of key continuity management with S/MIME and outlook express

Author keywords

E commerce; User interaction design; User studies

Indexed keywords

BARRIERS TO ADOPTION; E-COMMERCE; E-MAIL ADDRESS; E-MAIL SECURITY; ENCRYPTION SOFTWARE; KEY GENERATION; KEY MANAGEMENT; PHISHING; PUBLIC KEY CERTIFICATES; SECRET MESSAGES; SOCIAL ENGINEERING; TOOLBARS; USER INTERACTION DESIGN; USER STUDY; USER TESTS;

EID: 77953753799     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1073001.1073003     Document Type: Conference Paper
Times cited : (90)

References (16)
  • 2
    • 3042823619 scopus 로고    scopus 로고
    • Email-based identification and authentication: An alternative to PKI?
    • Nov. - Dec.
    • Simson L. Garfinkel. Email-based identification and authentication: An alternative to PKI? Security & Privacy Magazine, 1:20-26, Nov. - Dec. 2003.
    • (2003) Security & Privacy Magazine , vol.1 , pp. 20-26
    • Garfinkel, S.L.1
  • 3
    • 78649518901 scopus 로고    scopus 로고
    • Enabling email confidentiality through the use of opportunistic encryption
    • National Science Foundation
    • Simson L. Garfinkel. Enabling email confidentiality through the use of opportunistic encryption. In The 2003 National Conference on Digital Government Research. National Science Foundation, 2003.
    • (2003) The 2003 National Conference on Digital Government Research
    • Garfinkel, S.L.1
  • 6
    • 0003777824 scopus 로고
    • PhD thesis, MIT, Cambridge, MA, May, Undergraduate thesis supervised by L. Adleman
    • Loren M. Kohnfelder. Towards a practical public-key cryptosystem. PhD thesis, MIT, Cambridge, MA, May 1978. Undergraduate thesis supervised by L. Adleman.
    • (1978) Towards a Practical Public-key Cryptosystem
    • Kohnfelder, L.M.1
  • 9
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • AT&T, September 15
    • Frank Stajano and Ross Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In 1999 AT&T Software Symposium, pages 172-194. AT&T, September 15 1999.
    • (1999) 1999 AT&T Software Symposium , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 10
    • 77953785870 scopus 로고    scopus 로고
    • TechSmith
    • TechSmith. Camtasia studio, 2005.
    • (2005) Camtasia Studio
  • 11
    • 77953797002 scopus 로고    scopus 로고
    • Thawte Consulting., January 9, Version 2.1
    • Thawte Consulting. Certification practices statement version 2.1, January 9 2004.
    • (2004) Certification Practices Statement
  • 12
    • 19944372231 scopus 로고    scopus 로고
    • PhD thesis, School of Computer Science, Carnegie Mellon University
    • Alma Whitten. Making Security Usable. PhD thesis, School of Computer Science, Carnegie Mellon University, 2004.
    • (2004) Making Security Usable
    • Whitten, A.1
  • 15
    • 85084161247 scopus 로고    scopus 로고
    • Why johnny can't encrypt: A usability evaluation of PGP 5.0
    • Usenix
    • Alma Whitten and J. D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In 8th USENIX Security Symposium, pages 169 - 184. Usenix, 1999.
    • (1999) 8th USENIX Security Symposium , pp. 169-184
    • Whitten, A.1    Tygar, J.D.2
  • 16
    • 0003019023 scopus 로고    scopus 로고
    • SSH - Secure login connections over the internet
    • Usenix, (USENIX Association: Berkeley, CA)
    • T. Ylonen. SSH - secure login connections over the Internet. In Proceedings of the 6th Security Symposium) (USENIX Association: Berkeley, CA), page 37. Usenix, 1996.
    • (1996) Proceedings of the 6th Security Symposium , pp. 37
    • Ylonen, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.