메뉴 건너뛰기




Volumn 2015-July, Issue , 2015, Pages 232-249

SoK: Secure messaging

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 84945188762     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2015.22     Document Type: Conference Paper
Times cited : (141)

References (102)
  • 2
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • A. Whitten and J. D. Tygar, "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0," in Security Symposium. USENIX, 1999.
    • (1999) Security Symposium. USENIX
    • Whitten, A.1    Tygar, J.D.2
  • 3
    • 77953753799 scopus 로고    scopus 로고
    • Johnny 2: A user test of key continuity management with s/mime and outlook express
    • S. L. Garfinkel and R. C. Miller, "Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express," in Symposium on Usable Privacy and Security. ACM, 2005, pp. 13-24.
    • (2005) Symposium on Usable Privacy and Security. ACM , pp. 13-24
    • Garfinkel, S.L.1    Miller, R.C.2
  • 7
    • 84970904189 scopus 로고    scopus 로고
    • GoldBug Project
    • GoldBug Project. GoldBug-Secure Instant Messenger. [Online]. Available: http://goldbug.sourceforge.net/
    • GoldBug-Secure Instant Messenger
  • 8
    • 84945241388 scopus 로고    scopus 로고
    • Telegram
    • Telegram. Telegram Messenger. [Online]. Available: https://telegram. org/
    • Telegram Messenger
  • 11
    • 85024497839 scopus 로고    scopus 로고
    • Electronic Frontier Foundation
    • Electronic Frontier Foundation. Secure Messaging Scorecard. [Online]. Available: https://www.eff.org/secure-messaging-scorecard
    • Secure Messaging Scorecard
  • 12
    • 34548786769 scopus 로고    scopus 로고
    • The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
    • S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer, "The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies," in Symposium on Security and Privacy. IEEE, 2007, pp. 51-65.
    • (2007) Symposium on Security and Privacy. IEEE , pp. 51-65
    • Schechter, S.E.1    Dhamija, R.2    Ozment, A.3    Fischer, I.4
  • 14
    • 85067121009 scopus 로고    scopus 로고
    • Why (Special Agent) Johnny (Still) can't encrypt: A security analysis of the APCO Project 25 two-way radio system
    • S. Clark, T. Goodspeed, P. Metzger, Z. Wasserman, K. Xu, and M. Blaze, "Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-way Radio System," in Security Symposium. USENIX, 2011.
    • (2011) Security Symposium. USENIX
    • Clark, S.1    Goodspeed, T.2    Metzger, P.3    Wasserman, Z.4    Xu, K.5    Blaze, M.6
  • 19
    • 77649285446 scopus 로고
    • Evaluating a multimedia authoring tool with cognitive walkthrough and think-aloud user studies
    • Tech. Rep.
    • B. E. John and M. M. Mashyna, "Evaluating a Multimedia Authoring Tool with Cognitive Walkthrough and Think-Aloud User Studies," DTIC, Tech. Rep., 1995.
    • (1995) DTIC
    • John, B.E.1    Mashyna, M.M.2
  • 20
    • 84878353718 scopus 로고    scopus 로고
    • The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
    • J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano, "The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes," in Symposium on Security and Privacy. IEEE, 2012. [Online]. Available: http://www.jbonneau.com/doc/BHOS12-IEEESP-quest-to-replace-passwords.pdf
    • (2012) Symposium on Security and Privacy. IEEE
    • Bonneau, J.1    Herley, C.2    Van Oorschot, P.C.3    Stajano, F.4
  • 21
    • 84881218966 scopus 로고    scopus 로고
    • SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements
    • J. Clark and P. C. van Oorschot, "SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements," in Symposium on Security and Privacy. IEEE, 2013, pp. 511-525.
    • (2013) Symposium on Security and Privacy. IEEE , pp. 511-525
    • Clark, J.1    Van Oorschot, P.C.2
  • 22
    • 85034040740 scopus 로고    scopus 로고
    • Perspectives: Improving SSH-style host authentication with multi-path probing
    • D. Wendlandt, D. G. Andersen, and A. Perrig, "Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing," in Annual Technical Conference. USENIX, 2008, pp. 321-334.
    • (2008) Annual Technical Conference. USENIX , pp. 321-334
    • Wendlandt, D.1    Andersen, D.G.2    Perrig, A.3
  • 27
    • 84910628317 scopus 로고    scopus 로고
    • Wiretapping via mimicry: Short voice imitation man-in-the-middle attacks on crypto phones
    • M. Shirvanian and N. Saxena, "Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones," in Conference on Computer and Communications Security. ACM, 2014, pp. 868-879.
    • (2014) Conference on Computer and Communications Security. ACM , pp. 868-879
    • Shirvanian, M.1    Saxena, N.2
  • 28
    • 84955606093 scopus 로고    scopus 로고
    • Proving without knowing: On oblivious, agnostic and blindfolded provers
    • Springer
    • M. Jakobsson and M. Yung, "Proving Without Knowing: On Oblivious, Agnostic and Blindfolded Provers," in Advances in Cryptology-CRYPTO. Springer, 1996, pp. 186-200.
    • (1996) Advances in Cryptology-CRYPTO , pp. 186-200
    • Jakobsson, M.1    Yung, M.2
  • 30
    • 0035879575 scopus 로고    scopus 로고
    • A fair and efficient solution to the socialist millionaires' problem
    • F. Boudot, B. Schoenmakers, and J. Traoré, "A fair and efficient solution to the socialist millionaires' problem," Discrete Applied Mathematics, vol. 111, no. 1, pp. 23-36, 2001.
    • (2001) Discrete Applied Mathematics , vol.111 , Issue.1 , pp. 23-36
    • Boudot, F.1    Schoenmakers, B.2    Traoré, J.3
  • 33
    • 78649901040 scopus 로고    scopus 로고
    • More tricks for defeating SSL in practice
    • M. Marlinspike, "More tricks for defeating SSL in practice," in Black Hat USA, 2009.
    • (2009) Black Hat USA
    • Marlinspike, M.1
  • 34
    • 84866640975 scopus 로고    scopus 로고
    • VASCO Sep
    • VASCO. (2011, Sep) DigiNotar reports security incident. [Online]. Available: https://www.vasco.com/company/about-vasco/press-room/news-archive/2011/news-diginotar-reports-security-incident.aspx
    • (2011) DigiNotar Reports Security Incident
  • 37
    • 84945241398 scopus 로고    scopus 로고
    • Google
    • Google. End-To-End. [Online]. Available: https://github.com/google/end-to-end
    • End-To-End
  • 42
  • 49
    • 84945194642 scopus 로고    scopus 로고
    • Microsoft.
    • Microsoft. (2014) Does Skype use encryption? [Online]. Available: https://support.skype.com/en/faq/FA31/does-skype-use-encryption
    • (2014) Does Skype Use Encryption?
  • 51
    • 84945199746 scopus 로고    scopus 로고
    • Facebook.
    • Facebook. (2014) Facebook Help Center. [Online]. Available: https://www.facebook.com/help/
    • (2014) Facebook Help Center
  • 53
    • 26444595648 scopus 로고    scopus 로고
    • Secure/multipurpose internet mail extensions (s/mime) version 3.2 message specification
    • B. Ramsdell and S. Turner, "Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification," RFC 5751 (Proposed Standard), Internet Engineering Task Force, 2010. [Online]. Available: http://tools.ietf.org/rfc/rfc5751.txt
    • (2010) RFC 5751 (Proposed Standard), Internet Engineering Task Force
    • Ramsdell, B.1    Turner, S.2
  • 55
    • 85084160476 scopus 로고    scopus 로고
    • Defective sign & encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML
    • D. Davis, "Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML," in Annual Technical Conference, General Track. USENIX, 2001, pp. 65-78.
    • (2001) Annual Technical Conference, General Track. USENIX , pp. 65-78
    • Davis, D.1
  • 61
    • 84945241411 scopus 로고    scopus 로고
    • T. Perrin. (2013) Axolotl Ratchet. [Online]. Available: https://github. com/trevp/axolotl/wiki
    • (2013) Axolotl Ratchet
    • Perrin, T.1
  • 62
    • 33646756559 scopus 로고    scopus 로고
    • Modular security proofs for key agreement protocols
    • Springer
    • C. Kudla and K. G. Paterson, "Modular Security Proofs for Key Agreement Protocols," in Advances in Cryptology-ASIACRYPT. Springer, 2005, pp. 549-565.
    • (2005) Advances in Cryptology-ASIACRYPT , pp. 549-565
    • Kudla, C.1    Paterson, K.G.2
  • 72
    • 80054908259 scopus 로고    scopus 로고
    • Design and implementation of a secure instant messaging service based on elliptic-curve cryptography
    • C.-H. Yang, T.-Y. Kuo, T. Ahn, and C.-P Lee, "Design and Implementation of a Secure Instant Messaging Service based on Elliptic-Curve Cryptography," Journal of Computers, vol. 18, no. 4, pp. 31-38, 2008.
    • (2008) Journal of Computers , vol.18 , Issue.4 , pp. 31-38
    • Yang, C.-H.1    Kuo, T.-Y.2    Ahn, T.3    Lee, C.-P.4
  • 79
    • 84945241416 scopus 로고    scopus 로고
    • learn.equalit.ie/wiki/Np1sec
    • (2015) (n+1)sec. [Online]. Available: learn.equalit.ie/wiki/Np1sec
    • (2015) (n+1)sec
  • 81
    • 84945241418 scopus 로고    scopus 로고
    • B. Warner. (2014) Pairing Problems. [Online]. Available: https://blog. mozilla. org/warner/2014/04/02/pairing-problems/
    • (2014) Pairing Problems
    • Warner, B.1
  • 85
    • 84945188993 scopus 로고    scopus 로고
    • A. Langley. Pond. [Online]. Available: https://pond.imperialviolet.org/
    • Pond
    • Langley, A.1
  • 95
    • 70350639645 scopus 로고    scopus 로고
    • Composability and on-line deniability of authentication
    • Springer
    • Y. Dodis, J. Katz, A. Smith, and S. Walfish, "Composability and On-Line Deniability of Authentication," in Theory of Cryptography. Springer, 2009, pp. 146-162.
    • (2009) Theory of Cryptography , pp. 146-162
    • Dodis, Y.1    Katz, J.2    Smith, A.3    Walfish, S.4
  • 98
    • 85084160946 scopus 로고    scopus 로고
    • Establishing identity without certification authorities
    • C. M. Ellison, "Establishing Identity Without Certification Authorities," in Security Symposium. USENIX, 1996, pp. 67-76.
    • (1996) Security Symposium. USENIX , pp. 67-76
    • Ellison, C.M.1
  • 100
    • 84911425811 scopus 로고    scopus 로고
    • A censorship-resistant, privacy-enhancing and fully decentralized name system
    • Springer
    • M. Wachs, M. Schanzenbach, and C. Grothoff, "A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System," in Cryptology and Network Security. Springer, 2014, pp. 127-142.
    • (2014) Cryptology and Network Security , pp. 127-142
    • Wachs, M.1    Schanzenbach, M.2    Grothoff, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.