In Encryption We Don’t Trust: The Effect of End-to-End Encryption to the Masses on User Perception
暂无分享,去创建一个
[1] J. Ivey. Focus groups. , 2011, Pediatric nursing.
[2] Laura A. Dabbish,et al. "My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security , 2015, SOUPS.
[3] Michael J. Freedman,et al. CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication , 2014, IACR Cryptol. ePrint Arch..
[4] E. Brink,et al. Constructing grounded theory : A practical guide through qualitative analysis , 2006 .
[5] Christian Grothoff,et al. A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System , 2014, CANS.
[6] Franziska Roesner,et al. Investigating the Computer Security Practices and Needs of Journalists , 2015, USENIX Security Symposium.
[7] Laura A. Dabbish,et al. Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation , 2014, CCS.
[8] Kat Krol,et al. Poster : Mental Models – User understanding of messaging and encryption , 2016 .
[9] Laura A. Dabbish,et al. The Effect of Social Influence on Security Sensitivity , 2014, SOUPS.
[10] Jon Callas,et al. OpenPGP Message Format , 1998, RFC.
[11] Ian Goldberg,et al. Improved user authentication in off-the-record messaging , 2007, WPES '07.
[12] Ian Goldberg,et al. SoK: Secure Messaging , 2015, 2015 IEEE Symposium on Security and Privacy.
[13] M. Angela Sasse,et al. Obstacles to the Adoption of Secure Communication Tools , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[14] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[15] Ian Goldberg,et al. A user study of off-the-record messaging , 2008, SOUPS '08.
[16] Rick Wash,et al. Influencing mental models of security: a research agenda , 2011, NSPW '11.
[17] Martin Ortlieb,et al. Expert and Non-Expert Attitudes towards (Secure) Instant Messaging , 2016, SOUPS.
[18] Matthew Smith,et al. An Empirical Study of Textual Key-Fingerprint Representations , 2016, USENIX Security Symposium.
[19] Predrag V. Klasnja,et al. "When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use , 2009, CHI.
[20] P. Schofield. A Companion to Qualitative Research , 2005 .
[21] Anne Leitch,et al. Mental models: an interdisciplinary synthesis of theory and methods , 2011 .
[22] Ernst von Kardorff Uwe Flick,et al. A Companion to Qualitative Research , 2004 .
[23] Glenn A. Bowen. Naturalistic inquiry and the saturation concept: a research note , 2008 .
[24] L. Jean Camp,et al. Mental models of privacy and security , 2009, IEEE Technology and Society Magazine.
[25] Doowon Kim,et al. An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems , 2016, SOUPS.
[26] L. Jean Camp,et al. Mental Models of Security Risks , 2007, Financial Cryptography.
[27] Nikita Borisov,et al. Off-the-record communication, or, why not to use PGP , 2004, WPES '04.
[28] Rob Miller,et al. Johnny 2: a user test of key continuity management with S/MIME and Outlook Express , 2005, SOUPS '05.
[29] Rick Wash,et al. Organization Interfaces—collaborative computing General Terms , 2022 .
[30] W. Keith Edwards,et al. More than meets the eye: transforming the user experience of home network management , 2008, DIS '08.
[31] Edward W. Felten,et al. Secrecy, flagging, and paranoia: adoption criteria in encrypted email , 2006, CHI.
[32] Melanie Volkamer,et al. Why Doesn't Jane Protect Her Privacy? , 2014, Privacy Enhancing Technologies.
[33] Lorrie Faith Cranor,et al. Bridging the Gap in Computer Security Warnings: A Mental Model Approach , 2011, IEEE Security & Privacy.