Can Johnny build a protocol? Co-ordinating developer and user intentions for privacy-enhanced secure messaging protocols
暂无分享,去创建一个
[1] Nikita Borisov,et al. Off-the-record communication, or, why not to use PGP , 2004, WPES '04.
[2] Rob Miller,et al. Johnny 2: a user test of key continuity management with S/MIME and Outlook Express , 2005, SOUPS '05.
[3] Cas J. F. Cremers,et al. On Post-compromise Security , 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF).
[4] Michelle L. Mazurek,et al. You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users , 2016, 2016 IEEE Cybersecurity Development (SecDev).
[5] Morgan Meyer. The Rise of the Knowledge Broker , 2010 .
[6] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[7] Hugo Krawczyk,et al. Secure off-the-record messaging , 2005, WPES '05.
[8] Audun Jøsang,et al. Security in Mobile Communications: Challenges and Opportunities , 2003, ACSW.
[9] H. M. Collins,et al. The Third Wave of Science Studies , 2002, Science, Technology, and Society.
[10] Ian Goldberg,et al. Improved user authentication in off-the-record messaging , 2007, WPES '07.
[11] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[12] Jörg Schwenk,et al. How Secure is TextSecure? , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[13] Markus Huber,et al. When SIGNAL hits the Fan: On the Usability and Security of State-of-the-Art Secure Mobile Messaging , 2016 .
[14] Ian Goldberg,et al. A user study of off-the-record messaging , 2008, SOUPS '08.
[15] Ian Goldberg,et al. SoK: Secure Messaging , 2015, 2015 IEEE Symposium on Security and Privacy.
[16] Jakob Jakobsen,et al. On the CCA (in)Security of MTProto , 2015, SPSM@CCS.
[17] Matthew Green,et al. Developers are Not the Enemy!: The Need for Usable Security APIs , 2016, IEEE Security & Privacy.
[18] Don Davis,et al. Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML , 2001, USENIX Annual Technical Conference, General Track.
[19] S. Freytag. Image And Logic A Material Culture Of Microphysics , 2016 .
[20] J. Krige. How Users Matter: The Co-Construction of Users and Technology , 2006 .
[21] Matthew Smith,et al. Helping Johnny 2.0 to encrypt his Facebook conversations , 2012, SOUPS.