-
1
-
-
26144449189
-
The risks of key recovery, key escrow, and trusted third-party encryption
-
H. Abelson, R. Anderson, S.M. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, P.G. Neumann, R.L. Rivest, J.I. Schiller, et al. The risks of key recovery, key escrow, and trusted third-party encryption. World Wide Web Journal, 2(3):241-257, 1997.
-
(1997)
World Wide Web Journal
, vol.2
, Issue.3
, pp. 241-257
-
-
Abelson, H.1
Anderson, R.2
Bellovin, S.M.3
Benaloh, J.4
Blaze, M.5
Diffie, W.6
Gilmore, J.7
Neumann, P.G.8
Rivest, R.L.9
Schiller, J.I.10
-
2
-
-
77953971687
-
Determining what individual sus scores mean: Adding an adjective rating scale
-
A. Bangor, P. Kortum, and J. Miller. Determining what individual sus scores mean: Adding an adjective rating scale. Journal of Usability Studies, 4(3):114-123, 2009.
-
(2009)
Journal of Usability Studies
, vol.4
, Issue.3
, pp. 114-123
-
-
Bangor, A.1
Kortum, P.2
Miller, J.3
-
3
-
-
0002020833
-
Sus - A quick and dirty usability scale
-
J. Brooke. Sus-a quick and dirty usability scale. Usability evaluation in industry, 189:194, 1996.
-
(1996)
Usability Evaluation in Industry
, vol.189
, pp. 194
-
-
Brooke, J.1
-
6
-
-
85067121009
-
Why (special agent) Johnny (still) can't encrypt: A security analysis of the apco project 25 two-way radio system
-
USENIX Association
-
Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, and Matt Blaze. Why (special agent) johnny (still) can't encrypt: A security analysis of the apco project 25 two-way radio system. In Proceedings of the 20th USENIX Conference on Security. USENIX Association, 2011.
-
(2011)
Proceedings of the 20th USENIX Conference on Security
-
-
Clark, S.1
Goodspeed, T.2
Metzger, P.3
Wasserman, Z.4
Xu, K.5
Blaze, M.6
-
7
-
-
84865031605
-
Helping johnny 2.0 to encrypt his facebook conversations
-
pages 11:1-11:17, Washington, D.C., ACM
-
Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith, and Uwe Sander. Helping johnny 2.0 to encrypt his facebook conversations. In Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, pages 11:1-11:17, Washington, D.C., 2012. ACM.
-
(2012)
Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Smith, M.4
Sander, U.5
-
8
-
-
3042823619
-
Email-based identification and authentication: An alternative to pki?
-
Simson L. Garfinkel. Email-based identification and authentication: an alternative to PKI? IEEE Security & Privacy, pages 20-26, 2003.
-
(2003)
IEEE Security & Privacy
, pp. 20-26
-
-
Garfinkel, S.L.1
-
9
-
-
77953753799
-
Johnny 2: A user test of key continuity management with s/mime and outlook express
-
Pittsburgh, Pennsylvania, ACM
-
Simson L. Garfinkel and Robert C. Miller. Johnny 2: A user test of key continuity management with s/mime and outlook express. In Proceedings of the 2005 symposium on Usable privacy and security, SOUPS '05, pages 13-24, Pittsburgh, Pennsylvania, 2005. ACM.
-
(2005)
Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS '05
, pp. 13-24
-
-
Garfinkel, S.L.1
Miller, R.C.2
-
10
-
-
33745812088
-
Secrecy, flagging, and paranoia: Adoption criteria in encrypted email
-
ACM
-
S. Gaw, E.W. Felten, and P. Fernandez-Kelly. Secrecy, flagging, and paranoia: adoption criteria in encrypted email. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 591-600. ACM, 2006.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 591-600
-
-
Gaw, S.1
Felten, E.W.2
Fernandez-Kelly, P.3
-
11
-
-
77950877250
-
So long, and no thanks for the externalities: The rational rejection of security advice by users
-
ACM
-
C. Herley. So long, and no thanks for the externalities:The rational rejection of security advice by users. In Proceedings of the 2009 Workshop on New Security Paradigms Workshop, pages 133-144. ACM, 2009.
-
(2009)
Proceedings of the 2009 Workshop on New Security Paradigms Workshop
, pp. 133-144
-
-
Herley, C.1
-
12
-
-
77957013995
-
Cryptographic extraction and key derivation: The hkdf scheme
-
H. Krawczyk. Cryptographic extraction and key derivation: The hkdf scheme. Advances in Cryptology-CRYPTO 2010, pages 631-648, 2010.
-
(2010)
Advances in Cryptology-CRYPTO 2010
, pp. 631-648
-
-
Krawczyk, H.1
-
13
-
-
84873656329
-
Private facebook chat
-
IEEE
-
Chris Robison, Scott Ruoti, Timothy W van der Horst, and Kent E Seamons. Private facebook chat. In 2012 ASE/IEEE International Conference on Social Computing (SocialCom) and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT), pages 451-460. IEEE, 2012.
-
(2012)
2012 ASE/IEEE International Conference on Social Computing (SocialCom) and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT)
, pp. 451-460
-
-
Robison, C.1
Ruoti, S.2
Van Der Horst, T.W.3
Seamons, K.E.4
-
14
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
In George Blakley and David Chaum, editors, volume 196 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 10.1007/3-540-39568-7-5
-
Adi Shamir. Identity-based cryptosystems and signature schemes. In George Blakley and David Chaum, editors, Advances in Cryptology, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer Berlin/Heidelberg, 1985. 10.1007/3-540-39568-7-5.
-
(1985)
Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
17
-
-
84855678652
-
What makes users refuse web single sign-on?: An empirical investigation of openid
-
pages 4:1-4:20, Pittsburgh, Pennsylvania, ACM
-
San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, and Konstantin Beznosov. What makes users refuse web single sign-on?: an empirical investigation of openid. In Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, pages 4:1-4:20, Pittsburgh, Pennsylvania, 2011. ACM.
-
(2011)
Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11
-
-
Sun, S.-T.1
Pospisil, E.2
Muslukhov, I.3
Dindar, N.4
Hawkey, K.5
Beznosov, K.6
-
19
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of PGP 5.0
-
Alma Whitten and J. D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In 8th USENIX Security Symposium, 1999.
-
(1999)
8th USENIX Security Symposium
-
-
Whitten, A.1
Tygar, J.D.2
|