I Don't Even Have to Bother Them!: Using Social Media to Automate the Authentication Ceremony in Secure Messaging.
Elham VaziripourDevon HowardJake TylerMark O'NeillJustin WuKent E. SeamonsDaniel ZappalaPublished in: CHI (2019)
Keyphrases
- social media
- user authentication
- authentication mechanism
- identity management
- password authentication
- authentication scheme
- security mechanisms
- authentication protocol
- integrity verification
- data encryption
- rights management
- factor authentication
- security analysis
- key distribution
- security requirements
- content sharing
- secure manner
- fault tolerant
- public key cryptography
- secure communication
- security services
- security issues
- social networking
- cost model
- public key encryption
- smart card
- public key
- social networks
- private key
- personal information
- biometric authentication
- access control
- authentication systems
- big data
- encryption decryption
- electronic payment
- digital signature
- key agreement protocol
- security properties
- mutual authentication
- secret sharing scheme
- publish subscribe
- security model
- key management
- information security
- user generated content
- secret key