An empirical study of a decentralized identity wallet: Usability, security, and perspectives on user control

M Korir, S Parkin, P Dunphy - … symposium on usable privacy and security …, 2022 - usenix.org
User-centric digital identity initiatives are emerging with a mission to shift control over online
identity disclosures to the individual. However, there is little representation of prospective …

Exploring {User-Suitable} metaphors for differentially private data analyses

F Karegar, AS Alaqra, S Fischer-Hübner - Eighteenth Symposium on …, 2022 - usenix.org
Despite recent enhancements in the deployment of differential privacy (DP), little has been
done to address the human aspects of DP-enabled systems. Comprehending the complex …

Improving non-experts' understanding of end-to-end encryption: An exploratory study

W Bai, M Pearson, PG Kelley… - 2020 IEEE european …, 2020 - ieeexplore.ieee.org
End-to-end encryption (E2EE) can effectively protect the privacy of online communication
and has been adopted by several popular messaging apps. However, prior research …

Security at the End of the Tunnel: The Anatomy of {VPN} Mental Models Among Experts and {Non-Experts} in a Corporate Context

V Binkhorst, T Fiebig, K Krombholz, W Pieters… - 31st USENIX Security …, 2022 - usenix.org
With the worldwide COVID-19 pandemic in 2020 and 2021 necessitating working from
home, corporate Virtual Private Networks (VPNs) have become an important item securing …

Examining the impact of provenance-enabled media on trust and accuracy perceptions

KJK Feng, N Ritchie, P Blumenthal, A Parsons… - Proceedings of the …, 2023 - dl.acm.org
In recent years, industry leaders and researchers have proposed to use technical
provenance standards to address visual misinformation spread through digitally altered …

Exploring user mental models of {End-to-End} encrypted communication tools

R Abu-Salma, EM Redmiles, B Ur, M Wei - 8th USENIX Workshop on …, 2018 - usenix.org
End-to-end (E2E) encrypted communication tools can help users keep their communications
secure from government or corporate surveillance. In this work, we conduct a quantitative …

On the Limited Impact of Visualizing Encryption: Perceptions of {E2E} Messaging Security

C Stransky, D Wermke, J Schrader, N Huaman… - … Symposium on Usable …, 2021 - usenix.org
Communication tools with end-to-end (E2E) encryption help users maintain their privacy.
Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience …

Models matter: Setting accurate privacy expectations for local and central differential privacy

MA Smart, P Nanayakkara, R Cummings… - arxiv preprint arxiv …, 2024 - arxiv.org
Differential privacy is a popular privacy-enhancing technology that has been deployed both
in industry and government agencies. Unfortunately, existing explanations of differential …

Investigating security folklore: A case study on the tor over vpn phenomenon

M Fassl, A Ponticello, A Dabrowski… - Proceedings of the ACM …, 2023 - dl.acm.org
Users face security folklore in their daily lives in the form of security advice, myths, and word-
of-mouth stories. Using a VPN to access the Tor network, ie, Tor over VPN, is an interesting …

Evaluating {In-Workflow} messages for improving mental models of {End-to-End} encryption

O Akgul, W Bai, S Das, ML Mazurek - 30th USENIX Security Symposium …, 2021 - usenix.org
As large messaging providers increasingly adopt end-to-end encryption, private
communication is readily available to more users than ever before. However …