Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists
暂无分享,去创建一个
[1] B. Everitt,et al. Statistical methods for rates and proportions , 1973 .
[2] Daniel Zappala,et al. "We're on the Same Page": A Usability Study of Secure Email Using Pairs of Novice Users , 2015, CHI.
[3] Daniel Zappala,et al. Helping Johnny Understand and Avoid Mistakes: A Comparison of Automatic and Manual Encryption in Email , 2015, ArXiv.
[4] Edward Cutrell,et al. "Yours is better!": participant response bias in HCI , 2012, CHI.
[5] Jacob Cohen. A Coefficient of Agreement for Nominal Scales , 1960 .
[6] Ian Goldberg,et al. Leading Johnny to Water: Designing for Usability and Trust , 2015, SOUPS.
[7] Franziska Roesner,et al. Investigating the Computer Security Practices and Needs of Journalists , 2015, USENIX Security Symposium.
[8] 白石 善明,et al. "Confused Johnny: When Automatic Encryption Leads to Confusion and Mistakes"の紹介 , 2013 .
[9] Amit A. Levy,et al. Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.
[10] Michael J. Freedman,et al. CONIKS: Bringing Key Transparency to End Users , 2015, USENIX Security Symposium.
[11] Ian Goldberg,et al. SoK: Secure Messaging , 2015, 2015 IEEE Symposium on Security and Privacy.
[12] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[13] Franziska Roesner,et al. Individual versus Organizational Computer Security and Privacy Concerns in Journalism , 2016, Proc. Priv. Enhancing Technol..
[14] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[15] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[16] Nikita Borisov,et al. Off-the-record communication, or, why not to use PGP , 2004, WPES '04.
[17] Rob Miller,et al. Johnny 2: a user test of key continuity management with S/MIME and Outlook Express , 2005, SOUPS '05.
[18] K. Charmaz,et al. Constructing Grounded Theory , 2014 .
[19] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[20] Edward W. Felten,et al. Secrecy, flagging, and paranoia: adoption criteria in encrypted email , 2006, CHI.
[21] Matthew Smith,et al. Helping Johnny 2.0 to encrypt his Facebook conversations , 2012, SOUPS.
[22] Melanie Volkamer,et al. Why Doesn't Jane Protect Her Privacy? , 2014, Privacy Enhancing Technologies.
[23] Daniel Zappala,et al. Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a Modern PGP Client , 2015, ArXiv.