Kainda et al., 2010 - Google Patents
Two heads are better than one: security and usability of device associations in group scenariosKainda et al., 2010
View PDF- Document ID
- 12154886725496645084
- Author
- Kainda R
- Flechais I
- Roscoe A
- Publication year
- Publication venue
- Proceedings of the Sixth Symposium on Usable Privacy and Security
External Links
Snippet
We analyse and evaluate the usability and security of the process of bootstrapping security among devices in group scenarios. While a lot of work has been done in single user scenarios, we are not aware of any that focusses on group situations. Unlike in single user …
- 238000000034 method 0 abstract description 17
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9660995B2 (en) | Methods, systems, and computer readable media for combating device theft with user notarization | |
Kainda et al. | Usability and security of out-of-band channels in secure device pairing protocols | |
Uzun et al. | Usability analysis of secure pairing methods | |
US9094388B2 (en) | Methods and systems for identifying, verifying, and authenticating an identity | |
Vaziripour et al. | Is that you, Alice? A usability study of the authentication ceremony of secure messaging applications | |
US8807426B1 (en) | Mobile computing device authentication using scannable images | |
US20220060333A1 (en) | Methods and systems for cryptographically secured outputs from telemedicine sessions | |
Das et al. | A qualitative study on usability and acceptability of Yubico security key | |
US10110521B2 (en) | Communication support system | |
Kainda et al. | Two heads are better than one: security and usability of device associations in group scenarios | |
US11580559B2 (en) | Official vetting using composite trust value of multiple confidence levels based on linked mobile identification credentials | |
Ion et al. | Influence of user perception, security needs, and social factors on device pairing method choices | |
Uzun et al. | Pairing devices for social interactions: a comparative usability evaluation | |
Vaziripour et al. | I Don't Even Have to Bother Them! Using Social Media to Automate the Authentication Ceremony in Secure Messaging | |
Nithyanand et al. | Groupthink: Usability of secure group association for wireless devices | |
EP4014123A1 (en) | Systems and methods for self and social discovery | |
Jain et al. | New directions in social authentication | |
Mujeye | A survey on multi-factor authentication methods for mobile devices | |
US11968189B2 (en) | Methods and systems for generating a secure communication channel interface for video streaming of sensitive content | |
Gaci et al. | Privacy-aware digital mediation tools for improving adolescent mental well-being: application to school bullying | |
Putz et al. | Sounds Good? Fast and Secure Contact Exchange in Groups | |
Bicakci et al. | How safe is safety number? A user study on SIGNAL’s fingerprint and safety number methods for public key verification | |
Kainda et al. | Secure mobile ad-hoc interactions: reasoning about out-of-band (oob) channels | |
Fassl | Usable authentication ceremonies in secure instant messaging | |
Kainda | Human factors in hcbk protocols |