-
3
-
-
85067121009
-
Why (special agent) johnny (still) can't encrypt: A security analysis of the APCO project 25 two-way radio system
-
Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, and Matt Blaze. 2011. Why (special agent) Johnny (still) can't encrypt: A security analysis of the APCO Project 25 two-way radio system. In Proceedings of the 20th USENIX Conference on Security (SEC'11). http://dl.acm.org/citation.cfm?id=2028067.2028071
-
(2011)
Proceedings of the 20th USENIX Conference on Security (SEC'11)
-
-
Clark, S.1
Goodspeed, T.2
Metzger, P.3
Wasserman, Z.4
Xu, K.5
Blaze, M.6
-
5
-
-
85044843470
-
-
(2016)
-
Colin Davis. 2016. Robohash. (2016). https://robohash.org/
-
(2016)
Robohash
-
-
Davis, C.1
-
6
-
-
85019990383
-
An empirical study of textual key-fingerprint representations
-
Sergej Dechand, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha Fahl, and Matthew Smith. 2016. An empirical study of textual key-fingerprint representations. In 25th USENIX Security Symposium (USENIX Security 16). https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/dechand
-
(2016)
25th USENIX Security Symposium (USENIX Security 16)
-
-
Dechand, S.1
Schürmann, D.2
Busse, K.3
Acar, Y.4
Fahl, S.5
Smith, M.6
-
11
-
-
77950844750
-
A study of user-friendly hash comparison schemes
-
Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun, and Bo-Yin Yang. 2009. A study of user-friendly hash comparison schemes. In 2009 Annual Computer Security Applications Conference. DOI: http://dx.doi.org/10.1109/ACSAC.2009.20
-
(2009)
2009 Annual Computer Security Applications Conference
-
-
Hsiao, H.-C.1
Lin, Y.-H.2
Studer, A.3
Studer, C.4
Wang, K.-H.5
Kikuchi, H.6
Perrig, A.7
Sun, H.-M.8
Yang, B.-Y.9
-
18
-
-
85044871308
-
-
(1998)
-
Raph Levien and Donald Johnson. 1998. Snowflake. (1998). http://dlakwi.net/snowflake/snowflake.html
-
(1998)
Snowflake
-
-
Levien, R.1
Johnson, D.2
-
20
-
-
85044866740
-
-
(Oct 2016)
-
Skylar Nagao. 2016. Avatars. (Oct 2016). https://peerio.zendesk.com/hc/en-us/articles/202729949-Avatars
-
(2016)
Avatars
-
-
Nagao, S.1
-
21
-
-
85044865448
-
-
(2016)
-
Off-the-Record Messaging. 2016. Fingerprints. (2016). https://otr.cypherpunks.ca/help/fingerprint.php
-
(2016)
Fingerprints
-
-
-
25
-
-
85044868602
-
-
(2014)
-
David Roundy. 2014. Visual hash. (2014). http://visual-hash.readthedocs.io/en/latest/
-
(2014)
Visual Hash
-
-
Roundy, D.1
-
30
-
-
85044850619
-
-
Zettabyte Storage (2011)
-
Zettabyte Storage. 2011. Vash: The visual hash. (2011). https://web.archive.org/web/20130127121849/http://www.thevash.com
-
(2011)
Vash: The Visual Hash
-
-
-
31
-
-
84945188762
-
SoK: Secure messaging
-
Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, and Matthew Smith. 2015. SoK: Secure messaging. In Proceedings of the 2015 IEEE Symposium on Security and Privacy (SP '15). DOI: http://dx.doi.org/10.1109/Sp.2015.22
-
(2015)
Proceedings of the 2015 IEEE Symposium on Security and Privacy (SP '15)
-
-
Unger, N.1
Dechand, S.2
Bonneau, J.3
Fahl, S.4
Perl, H.5
Goldberg, I.6
Smith, M.7
-
36
-
-
85044857321
-
-
(2016)
-
Wickr. 2016. What is the key verification feature? (2016). https://wickr.desk.com/customer/en/portal/articles/2342342-what-is-the-key-verification-feature
-
(2016)
What Is the Key Verification Feature?
-
-
|