메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Confused Johnny: When automatic encryption leads to confusion and mistakes

Author keywords

Manual encryption; Secure email; Security overlays; Usable security

Indexed keywords

AMOUNT OF INFORMATION; CIPHERTEXTS; KEY MANAGEMENT; USABLE SECURITY; USER STUDY; WEBMAIL;

EID: 84883079764     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2501604.2501609     Document Type: Conference Paper
Times cited : (76)

References (19)
  • 2
    • 77953971687 scopus 로고    scopus 로고
    • Determining what individual sus scores mean: Adding an adjective rating scale
    • A. Bangor, P. Kortum, and J. Miller. Determining what individual sus scores mean: Adding an adjective rating scale. Journal of Usability Studies, 4(3):114-123, 2009.
    • (2009) Journal of Usability Studies , vol.4 , Issue.3 , pp. 114-123
    • Bangor, A.1    Kortum, P.2    Miller, J.3
  • 3
    • 0002020833 scopus 로고    scopus 로고
    • Sus - A quick and dirty usability scale
    • J. Brooke. Sus-a quick and dirty usability scale. Usability evaluation in industry, 189:194, 1996.
    • (1996) Usability Evaluation in Industry , vol.189 , pp. 194
    • Brooke, J.1
  • 8
    • 3042823619 scopus 로고    scopus 로고
    • Email-based identification and authentication: An alternative to pki?
    • Simson L. Garfinkel. Email-based identification and authentication: an alternative to PKI? IEEE Security & Privacy, pages 20-26, 2003.
    • (2003) IEEE Security & Privacy , pp. 20-26
    • Garfinkel, S.L.1
  • 11
    • 77950877250 scopus 로고    scopus 로고
    • So long, and no thanks for the externalities: The rational rejection of security advice by users
    • ACM
    • C. Herley. So long, and no thanks for the externalities:The rational rejection of security advice by users. In Proceedings of the 2009 Workshop on New Security Paradigms Workshop, pages 133-144. ACM, 2009.
    • (2009) Proceedings of the 2009 Workshop on New Security Paradigms Workshop , pp. 133-144
    • Herley, C.1
  • 12
    • 77957013995 scopus 로고    scopus 로고
    • Cryptographic extraction and key derivation: The hkdf scheme
    • H. Krawczyk. Cryptographic extraction and key derivation: The hkdf scheme. Advances in Cryptology-CRYPTO 2010, pages 631-648, 2010.
    • (2010) Advances in Cryptology-CRYPTO 2010 , pp. 631-648
    • Krawczyk, H.1
  • 14
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • In George Blakley and David Chaum, editors, volume 196 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 10.1007/3-540-39568-7-5
    • Adi Shamir. Identity-based cryptosystems and signature schemes. In George Blakley and David Chaum, editors, Advances in Cryptology, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer Berlin/Heidelberg, 1985. 10.1007/3-540-39568-7-5.
    • (1985) Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 19
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • Alma Whitten and J. D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In 8th USENIX Security Symposium, 1999.
    • (1999) 8th USENIX Security Symposium
    • Whitten, A.1    Tygar, J.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.