[go: up one dir, main page]

Kainda et al., 2010 - Google Patents

Two heads are better than one: security and usability of device associations in group scenarios

Kainda et al., 2010

View PDF
Document ID
12154886725496645084
Author
Kainda R
Flechais I
Roscoe A
Publication year
Publication venue
Proceedings of the Sixth Symposium on Usable Privacy and Security

External Links

Snippet

We analyse and evaluate the usability and security of the process of bootstrapping security among devices in group scenarios. While a lot of work has been done in single user scenarios, we are not aware of any that focusses on group situations. Unlike in single user …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US9660995B2 (en) Methods, systems, and computer readable media for combating device theft with user notarization
Kainda et al. Usability and security of out-of-band channels in secure device pairing protocols
Uzun et al. Usability analysis of secure pairing methods
US9094388B2 (en) Methods and systems for identifying, verifying, and authenticating an identity
Vaziripour et al. Is that you, Alice? A usability study of the authentication ceremony of secure messaging applications
US8807426B1 (en) Mobile computing device authentication using scannable images
US20220060333A1 (en) Methods and systems for cryptographically secured outputs from telemedicine sessions
Das et al. A qualitative study on usability and acceptability of Yubico security key
US10110521B2 (en) Communication support system
Kainda et al. Two heads are better than one: security and usability of device associations in group scenarios
US11580559B2 (en) Official vetting using composite trust value of multiple confidence levels based on linked mobile identification credentials
Ion et al. Influence of user perception, security needs, and social factors on device pairing method choices
Uzun et al. Pairing devices for social interactions: a comparative usability evaluation
Vaziripour et al. I Don't Even Have to Bother Them! Using Social Media to Automate the Authentication Ceremony in Secure Messaging
Nithyanand et al. Groupthink: Usability of secure group association for wireless devices
EP4014123A1 (en) Systems and methods for self and social discovery
Jain et al. New directions in social authentication
Mujeye A survey on multi-factor authentication methods for mobile devices
US11968189B2 (en) Methods and systems for generating a secure communication channel interface for video streaming of sensitive content
Gaci et al. Privacy-aware digital mediation tools for improving adolescent mental well-being: application to school bullying
Putz et al. Sounds Good? Fast and Secure Contact Exchange in Groups
Bicakci et al. How safe is safety number? A user study on SIGNAL’s fingerprint and safety number methods for public key verification
Kainda et al. Secure mobile ad-hoc interactions: reasoning about out-of-band (oob) channels
Fassl Usable authentication ceremonies in secure instant messaging
Kainda Human factors in hcbk protocols