Security ceremonies : including humans in cryptographic protocols
暂无分享,去创建一个
[1] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[2] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.
[3] David Ma,et al. Does domain highlighting help people identify phishing sites? , 2011, CHI.
[4] Ian H. Witten,et al. Arithmetic coding revisited , 1998, TOIS.
[5] Mike Bond,et al. 2010 IEEE Symposium on Security and Privacy Chip and PIN is Broken , 2022 .
[6] Serge Vaudenay,et al. Secure Communications over Insecure Channels Based on Short Authenticated Strings , 2005, CRYPTO.
[7] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[8] Berk Sunar,et al. PUF-HB: A Tamper-Resilient HB Based Authentication Protocol , 2008, ACNS.
[9] Tone Bratteteig,et al. Disentangling power and decision-making in participatory design , 2012, PDC '12.
[10] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[11] Jungwon Lee,et al. What makes Internet users visit cyber stores again? key design factors for customer loyalty , 2000, CHI.
[12] Martín Abadi,et al. Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..
[13] A. Darwish,et al. Eye tracking analysis of browser security indicators , 2012, 2012 International Conference on Computer Systems and Industrial Informatics.
[14] Serge Egelman,et al. It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions , 2009, IEEE Symposium on Security and Privacy.
[15] Alexander De Luca,et al. Shining Chrome: Using Web Browser Personas to Enhance SSL Certificate Visualization , 2011, INTERACT.
[16] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[17] D. Koehn. The Nature of and Conditions for Online Trust , 2003 .
[18] Colin Boyd,et al. Protocols for Key Establishment and Authentication , 2003 .
[19] Alexander W. Dent. A Note On Game-Hopping Proofs , 2006, IACR Cryptol. ePrint Arch..
[20] Paul Dourish,et al. What we talk about when we talk about context , 2004, Personal and Ubiquitous Computing.
[21] Matti Tedre,et al. Science of the Artificial , 2014 .
[22] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[23] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[24] Ann Blandford,et al. Detecting Cognitive Causes of Confidentiality Leaks , 2007, FMIS@ICFEM.
[25] Kenneth G. Paterson,et al. Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol , 2011, ASIACRYPT.
[26] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[27] Adam Shostack,et al. The New School of Information Security , 2008 .
[28] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[29] Tibor Jager,et al. On the Security of TLS-DHE in the Standard Model , 2012, CRYPTO.
[30] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[31] Richard W. Hamming,et al. Error detecting and error correcting codes , 1950 .
[32] Ka-Ping Yee. Secure Interaction Design and the Principle of Least Authority , 2003 .
[33] Stuart E. Schechter,et al. The Emperor's New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies † , 2007 .
[34] Ran Canetti,et al. POSH: a generalized captcha with security applications , 2008, AISec '08.
[35] L. Jean Camp,et al. Mental Models of Security Risks , 2007, Financial Cryptography.
[36] Marie Christine Roy,et al. The impact of interface usability on trust in Web retailers , 2001, Internet Res..
[37] Nitesh Saxena,et al. Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns , 2008, ACNS.
[38] Colin Boyd,et al. On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited , 2004, SCN.
[39] Jörg Schwenk,et al. User-aware provably secure protocols for browser-based mutual authentication , 2009, Int. J. Appl. Cryptogr..
[40] Collin Jackson,et al. Forcehttps: protecting high-security web sites from network attacks , 2008, WWW.
[41] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[42] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.
[43] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[44] Julien Bringer,et al. HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).
[45] Alain Forget,et al. User interface design affects security: patterns in click-based graphical passwords , 2009, International Journal of Information Security.
[46] Glen G. Langdon,et al. An Introduction to Arithmetic Coding , 1984, IBM J. Res. Dev..
[47] P. Liamputtong. Qualitative data analysis: conceptual and practical considerations. , 2009, Health promotion journal of Australia : official journal of Australian Association of Health Promotion Professionals.
[48] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[49] Phoebe Sengers,et al. The Three Paradigms of HCI , 2007 .
[50] Margot Brereton,et al. Tensions in Developing a Secure Collective Information Practice - The Case of Agile Ridesharing , 2011, INTERACT.
[51] Paul A. Pavlou,et al. Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..
[52] Cliff Lampe,et al. A face(book) in the crowd: social Searching vs. social browsing , 2006, CSCW '06.
[53] Richard Mollin. Codes: The Guide to Secrecy From Ancient to Modern Times , 2005 .
[54] Emmanuel Aroms,et al. NIST Special Publication 800-63 Electronic Authentication Guideline , 2012 .
[55] Karen Holtzblatt,et al. Contextual design: using customer work models to drive systems design , 1996, CHI Extended Abstracts.
[56] Arun Kumar,et al. Article in Press Pervasive and Mobile Computing ( ) – Pervasive and Mobile Computing a Comparative Study of Secure Device Pairing Methods , 2022 .
[57] Adam Bender,et al. Review of "Codes: The Guide to Secrecy from Ancient to Modern Times by Richard A. Mollin", Chapman & Hall/CRC, 2005 , 2006, SIGA.
[58] Paul Dourish,et al. Beyond the user: use and non-use in HCI , 2009, OZCHI.
[59] Robert Biddle,et al. Even Experts Deserve Usable Security: Design guidelines for security management systems , 2007 .
[60] Serge Egelman,et al. It's No Secret. Measuring the Security and Reliability of Authentication via “Secret” Questions , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[61] Ann Blandford,et al. Modelling and analysing cognitive causes of security breaches , 2008, Innovations in Systems and Software Engineering.
[62] Steven J. Murdoch,et al. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication , 2010, Financial Cryptography.
[63] Angela Sasse,et al. Humans in the Loop Human – Computer Interaction and Security , 2022 .
[64] Serge Vaudenay,et al. SAS-Based Authenticated Key Agreement , 2006, Public Key Cryptography.
[65] Paul Dourish,et al. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena , 2006, Hum. Comput. Interact..
[66] J. Doug Tygar,et al. The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.
[67] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[68] Ka-Ping Yee,et al. Aligning Security and Usability , 2004, IEEE Secur. Priv..
[69] Andrew S. Patrick,et al. HCI and security systems , 2003, CHI Extended Abstracts.
[70] Andrew Chi-Chih Yao,et al. Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.
[71] J. Doug Tygar,et al. Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks , 2005, HIP.
[72] Dianne Cyr,et al. Modeling Web Site Design Across Cultures: Relationships to Trust, Satisfaction, and E-Loyalty , 2008, J. Manag. Inf. Syst..
[73] Margot Brereton,et al. Towards a Secure Human-and-Computer Mutual Authentication Protocol , 2012, AISC.
[74] Margot Brereton,et al. Interaction, privacy and profiling considerations in local mobile social software: a prototype agile ride share system , 2010, OZCHI '10.
[75] Colin Potts,et al. Design of Everyday Things , 1988 .
[76] Min Wu,et al. Do security toolbars actually prevent phishing attacks? , 2006, CHI.
[77] Lorrie Faith Cranor,et al. Improving Computer Security Dialogs , 2011, INTERACT.
[78] M. Helander,et al. Affective design of E-commerce user interfaces: how to maximise perceived trustworthiness , 2001 .
[79] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[80] Victor Shoup,et al. Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..
[81] Lucy Suchman,et al. Human-Machine Reconfigurations: Plans and Situated Actions , 2006 .
[82] Abraham Lempel,et al. A universal algorithm for sequential data compression , 1977, IEEE Trans. Inf. Theory.
[83] Margot Brereton,et al. How HCI design influences web security decisions , 2010, OZCHI '10.
[84] Kirstie Hawkey,et al. Revealing hidden context: improving mental models of personal firewall users , 2009, SOUPS.
[85] Nicholas Bohm,et al. Electronic Commerce: Who Carries the Risk of Fraud? , 2000, J. Inf. Law Technol..
[86] Charles J. Kacmar,et al. The impact of initial consumer trust on intentions to transact with a web site: a trust building model , 2002, J. Strateg. Inf. Syst..
[87] Stefan Dziembowski. How to Pair with a Human , 2010, SCN.
[88] David A. Wagner,et al. Conditioned-safe ceremonies and a user study of an application to web authentication , 2009, NDSS.
[89] Jean Everson Martina,et al. An updated threat model for security ceremonies , 2013, SAC '13.
[90] P. Liamputtong,et al. Qualitative Research Methods 2nd ed , 2005 .
[91] Moti Yung,et al. Fourth-factor authentication: somebody you know , 2006, CCS '06.
[92] Karen Holtzblatt,et al. Contextual design , 1997, INTR.
[93] Sebastian Günther. Folk Models of Home Computer Security , 2012 .
[94] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[95] Carl M. Ellison,et al. Public-key support for group collaboration , 2003, TSEC.
[96] Cormac Herley,et al. So long, and no thanks for the externalities: the rational rejection of security advice by users , 2009, NSPW '09.
[97] Amir Herzberg,et al. Why Johnny can't surf (safely)? Attacks and defenses for web users , 2009, Comput. Secur..
[98] Herbert A. Simon,et al. The Sciences of the Artificial , 1970 .
[99] Jean Everson Martina,et al. Ceremonies Formal Analysis in PKI's Context , 2009, 2009 International Conference on Computational Science and Engineering.
[100] Kat Krol,et al. Don't work. Can't work? Why it's time to rethink security warnings , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).
[101] Carl M. Ellison,et al. Ceremony Design and Analysis , 2007, IACR Cryptol. ePrint Arch..
[102] A. Strauss,et al. The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .
[103] Detmar W. Straub,et al. The Relative Importance of Perceived Ease of Use in IS Adoption: A Study of E-Commerce Adoption , 2000, J. Assoc. Inf. Syst..
[104] Mihir Bellare,et al. Practice-Oriented Provable Security , 1998, Lectures on Data Security.
[105] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[106] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[107] Margot Brereton,et al. Ceremony Analysis: Strengths and Weaknesses , 2011, SEC.
[108] Lorrie Faith Cranor,et al. Bridging the Gap in Computer Security Warnings: A Mental Model Approach , 2011, IEEE Security & Privacy.
[109] Donald Ervin Knuth,et al. The Art of Computer Programming, 2nd Ed. (Addison-Wesley Series in Computer Science and Information , 1978 .
[110] Claude E. Shannon,et al. The Mathematical Theory of Communication , 1950 .
[111] Colin Boyd,et al. Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.
[112] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[113] Kirstie Hawkey,et al. "I did it because I trusted you" : Challenges with the Study Environment Biasing Participant Behaviours , 2010 .
[114] Sameer Patil,et al. Who gets to know what when: configuring privacy permissions in an awareness application , 2005, CHI.
[115] Ahmad-Reza Sadeghi,et al. Provably secure browser-based user-aware mutual authentication over TLS , 2008, ASIACCS '08.
[116] Giampaolo Bella,et al. Formal Correctness of Security Protocols , 2007 .
[117] Sandeep Dayal,et al. How to Build Trust Online , 2003 .
[118] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.
[119] Yong Liu,et al. Do I Do What I Say?: Observed Versus Stated Privacy Preferences , 2007, INTERACT.
[120] Amir Herzberg,et al. Security and identification indicators for browsers against spoofing and phishing attacks , 2008, TOIT.
[121] Dongwan Shin,et al. Supporting visual security cues for WebView-based Android apps , 2013, SAC '13.