7 Hits in 9.4 sec

Johnny 2

Simson L. Garfinkel, Robert C. Miller
2005 Proceedings of the 2005 symposium on Usable privacy and security - SOUPS '05  
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificates.  ...  We present the first user study of KCM-secured email, conducted on naive users who had no previous experience with secure email.  ...  Availability We have made the entire Johnny 2 experimental setup available for download so that other researchers can it as a standardized scenario for testing secure messaging systems.  ... 
doi:10.1145/1073001.1073003 dblp:conf/soups/GarfinkelM05 fatcat:bhf5yi4npbdbbbtd54ej2yogxa

ABUSE: PKI for Real-World Email Trust [chapter]

Chris Masone, Sean W. Smith
2010 Lecture Notes in Computer Science  
In this way, the system also provides sender authenticity and assurance of sender identity-in addition to the sender's public key.  ...  An S/MIME signature block contains, in addition to the actual digital signature over the message body, the identity certificate of the sender.  ...  Applying tools from the social science was a key part of exploring what that "right information" is, and we hope that more computer science researchers will take these tools into account when studying  ... 
doi:10.1007/978-3-642-16441-5_10 fatcat:abbfmmajhvhmbabogyuyixs2sa

Why Joanie Can Encrypt

John S. Koh, Steven M. Bellovin, Jason Nieh
2019 Proceedings of the Fourteenth EuroSys Conference 2019 CD-ROM on ZZZ - EuroSys '19  
To avoid the problem of moving a single private key between devices, we implement per-device key pairs: only public keys need be synchronized via a simple verification step.  ...  key; the original message is then replaced.  ...  Related Work The seminal "Why Johnny Can't Encrypt" paper illuminated the confusing process of encrypting email and showed how inaccessible PGP is to average users [42] .  ... 
doi:10.1145/3302424.3303980 dblp:conf/eurosys/KohBN19 fatcat:fzh74pjxmbel3l7edc3r6szvkq

Analysing and improving the crypto ecosystem of Rust [article]

Philipp Keck, Universität Stuttgart, Universität Stuttgart
For such an API and for the improvement of existing APIs, the thesis discusses a number of design decisions and their usability implications.  ...  Results: The contributors are typical open source developers and they collaborate in typical ways on GitHub. Most libraries have a clear main developer and there is a general lack of contributors.  ...  Acknowledgements I would like to thank my supervisor Kai Mindermann for coming up with this exciting topic and for his guidance, advice and collaboration.  ... 
doi:10.18419/opus-9294 fatcat:qm3ltmtwwjdoliugpd6exjg2y4

On the importance of ecologically valid usable security research for end users and IT workers [article]

Sascha Fahl, University, My
With their groundbreaking work "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0" in 1999 Whitten and Tyga [201] demonstrated the importance of usability and human computer interaction (HCI  ...  TLS Pinning TLS public key pinning can be configured by app developers to limit the number of certificates an app trusts.  ...  How many of these messages have more than one recipient? Post-Task Please rate the following questions regarding the mechanism you just used.  ... 
doi:10.15488/8668 fatcat:7oh5c5uplrdbdhwnejmhnfo5fi

Easy Encryption for Email, Photo, and Other Cloud Services

John Seunghyun Koh
Unfortunately, the security of many cloud services for user data is lacking, and the vast amount of user data stored in the cloud is an attractive target for adversaries.  ...  Even a single compromise of a user's account yields all its data to attackers. A breach of an unencrypted email account gives the attacker full access to years, even decades, of emails.  ...  Related Work The seminal "Why Johnny Can't Encrypt" paper illuminated the confusing process of encrypting email and showed how inaccessible PGP is to average users [13] .  ... 
doi:10.7916/d8-40ce-qn14 fatcat:mryc5fruojgttot57unwakr2dq

Developer factor in software privacy [article]

Mohammad Tahaei, University Of Edinburgh, Kami Vaniea, Markulf Kohlweiss
Privacy champions face an uphill battle to counter many of the same privacy misconceptions seen in the general population, [...]  ...  Developers interactions with tools and software development platforms, shape their understanding of what privacy means, such as consent and access control.  ...  Opinions, findings, and conclusions are those of the authors and do not necessarily reflect the views of the funders. The Developer Factor in Software Privacy Back Cover  ... 
doi:10.7488/era/1485 fatcat:cuv6itafdrdz3dif2s7mdox6ty