A systematic literature review of empirical methods and risk representation in usable privacy and security research
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …
represent risk to research participants. To understand how these approaches are used and …
How well do my results generalize? comparing security and privacy survey results from mturk, web, and telephone samples
Security and privacy researchers often rely on data collected from Amazon Mechanical Turk
(MTurk) to evaluate security tools, to understand users' privacy preferences and to measure …
(MTurk) to evaluate security tools, to understand users' privacy preferences and to measure …
Obstacles to the adoption of secure communication tools
The computer security community has advocated widespread adoption of secure
communication tools to counter mass surveillance. Several popular personal communication …
communication tools to counter mass surveillance. Several popular personal communication …
More is less: On the end-to-end security of group chats in signal, whatsapp, and threema
Secure instant messaging is utilized in two variants: one-to-one communication and group
communication. While the first variant has received much attention lately (Frosch et al …
communication. While the first variant has received much attention lately (Frosch et al …
Can unicorns help users compare crypto key fingerprints?
Many authentication schemes ask users to manually compare compact representations of
cryptographic keys, known as fingerprints. If the fingerprints do not match, that may signal a …
cryptographic keys, known as fingerprints. If the fingerprints do not match, that may signal a …
Is that you, Alice? A usability study of the authentication ceremony of secure messaging applications
E Vaziripour, J Wu, M O'Neill, J Whitehead… - … Symposium on Usable …, 2017 - usenix.org
The effective security provided by secure messaging applications depends heavily on users
completing an authentication ceremony| a sequence of manual operations enabling users to …
completing an authentication ceremony| a sequence of manual operations enabling users to …
On the Limited Impact of Visualizing Encryption: Perceptions of {E2E} Messaging Security
Communication tools with end-to-end (E2E) encryption help users maintain their privacy.
Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience …
Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience …
Exploring user mental models of {End-to-End} encrypted communication tools
End-to-end (E2E) encrypted communication tools can help users keep their communications
secure from government or corporate surveillance. In this work, we conduct a quantitative …
secure from government or corporate surveillance. In this work, we conduct a quantitative …
Sounds Good? Fast and Secure Contact Exchange in Groups
Trustworthy digital communication requires the secure exchange of contact information, but
current approaches lack usability and scalability for larger groups of users. We evaluate the …
current approaches lack usability and scalability for larger groups of users. We evaluate the …
What did I really vote for? On the usability of verifiable e-voting schemes
E-voting has been embraced by a number of countries, delivering benefits in terms of
efficiency and accessibility. End-to-end verifiable e-voting schemes facilitate verification of …
efficiency and accessibility. End-to-end verifiable e-voting schemes facilitate verification of …