Sciweavers

FC
2007
Springer
152views Cryptology» more  FC 2007»
14 years 5 months ago
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup
Abstract. Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Se...
Cynthia Kuo, Jesse Walker, Adrian Perrig
FC
2007
Springer
118views Cryptology» more  FC 2007»
14 years 5 months ago
Improved Multi-party Contract Signing
Aybek Mukhamedov, Mark Ryan
FC
2007
Springer
148views Cryptology» more  FC 2007»
14 years 5 months ago
A Model of Onion Routing with Provable Anonymity
Onion routing is a scheme for anonymous communication that is designed for practical use. Until now, however, it has had no formal model and therefore no rigorous analysis of its a...
Joan Feigenbaum, Aaron Johnson, Paul F. Syverson
FC
2007
Springer
104views Cryptology» more  FC 2007»
14 years 5 months ago
A Sense of Security in Pervasive Computing - Is the Light on When the Refrigerator Door Is Closed?
In this paper, we investigate how existing theoretical contributions on usable security can serve to guide the design of a specific system. We illustrate how going through this the...
Jakob Illeborg Pagter, Marianne Graves Petersen
FC
2007
Springer
136views Cryptology» more  FC 2007»
14 years 5 months ago
Usability Analysis of Secure Pairing Methods
Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electroni...
Ersin Uzun, Kristiina Karvonen, N. Asokan
FC
2007
Springer
105views Cryptology» more  FC 2007»
14 years 5 months ago
Phishing IQ Tests Measure Fear, Not Ability
We argue that phishing IQ tests fail to measure susceptibility to phishing attacks. We conducted a study where 40 subjects were asked to answer a selection of questions from exist...
Vivek Anandpara, Andrew Dingman, Markus Jakobsson,...
FC
2007
Springer
117views Cryptology» more  FC 2007»
14 years 5 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
FC
2007
Springer
122views Cryptology» more  FC 2007»
14 years 5 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp
FC
2007
Springer
106views Cryptology» more  FC 2007»
14 years 5 months ago
Dynamic Virtual Credit Card Numbers
Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credi...
Ian Molloy, Jiangtao Li, Ninghui Li
FC
2007
Springer
119views Cryptology» more  FC 2007»
14 years 5 months ago
Improving Usability by Adding Security to Video Conferencing Systems
Many video conferencing solutions exist in the market today and many new ones are being introduced. In striving to provide an experience to users as close to “being there” as p...
April Slayden Mitchell, Alan H. Karp