A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

How well do my results generalize? comparing security and privacy survey results from mturk, web, and telephone samples

EM Redmiles, S Kross… - 2019 IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Security and privacy researchers often rely on data collected from Amazon Mechanical Turk
(MTurk) to evaluate security tools, to understand users' privacy preferences and to measure …

Obstacles to the adoption of secure communication tools

R Abu-Salma, MA Sasse, J Bonneau… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
The computer security community has advocated widespread adoption of secure
communication tools to counter mass surveillance. Several popular personal communication …

More is less: On the end-to-end security of group chats in signal, whatsapp, and threema

P Rösler, C Mainka, J Schwenk - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Secure instant messaging is utilized in two variants: one-to-one communication and group
communication. While the first variant has received much attention lately (Frosch et al …

Can unicorns help users compare crypto key fingerprints?

J Tan, L Bauer, J Bonneau, LF Cranor… - Proceedings of the …, 2017 - dl.acm.org
Many authentication schemes ask users to manually compare compact representations of
cryptographic keys, known as fingerprints. If the fingerprints do not match, that may signal a …

Is that you, Alice? A usability study of the authentication ceremony of secure messaging applications

E Vaziripour, J Wu, M O'Neill, J Whitehead… - … Symposium on Usable …, 2017 - usenix.org
The effective security provided by secure messaging applications depends heavily on users
completing an authentication ceremony| a sequence of manual operations enabling users to …

On the Limited Impact of Visualizing Encryption: Perceptions of {E2E} Messaging Security

C Stransky, D Wermke, J Schrader, N Huaman… - … Symposium on Usable …, 2021 - usenix.org
Communication tools with end-to-end (E2E) encryption help users maintain their privacy.
Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience …

Exploring user mental models of {End-to-End} encrypted communication tools

R Abu-Salma, EM Redmiles, B Ur, M Wei - 8th USENIX Workshop on …, 2018 - usenix.org
End-to-end (E2E) encrypted communication tools can help users keep their communications
secure from government or corporate surveillance. In this work, we conduct a quantitative …

Sounds Good? Fast and Secure Contact Exchange in Groups

F Putz, S Haesler, M Hollick - Proceedings of the ACM on Human …, 2024 - dl.acm.org
Trustworthy digital communication requires the secure exchange of contact information, but
current approaches lack usability and scalability for larger groups of users. We evaluate the …

What did I really vote for? On the usability of verifiable e-voting schemes

K Marky, O Kulyk, K Renaud, M Volkamer - Proceedings of the 2018 CHI …, 2018 - dl.acm.org
E-voting has been embraced by a number of countries, delivering benefits in terms of
efficiency and accessibility. End-to-end verifiable e-voting schemes facilitate verification of …