On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security.
Christian StranskyDominik WermkeJohanna SchraderNicolas HuamanYasemin AcarAnna Lena FehlhaberMiranda WeiBlase UrSascha FahlPublished in: SOUPS @ USENIX Security Symposium (2021)
Keyphrases
- security properties
- encryption scheme
- encryption algorithms
- encryption decryption
- data encryption
- key management
- high security
- encryption algorithm
- identity authentication
- security analysis
- digital rights management
- elliptic curve cryptography
- key exchange
- cryptographic protocols
- data security
- access control
- virtual private network
- security requirements
- private key
- public key cryptography
- security issues
- data confidentiality
- network security
- information security
- advanced encryption standard
- secret key
- statistical databases
- security policies
- cryptographic algorithms
- intrusion detection
- security level
- integrity verification
- security mechanisms
- secure communication
- elliptic curve