Login / Signup
A Comparative Usability Study of Key Management in Secure Email.
Scott Ruoti
Jeff Andersen
Tyler Monson
Daniel Zappala
Kent E. Seamons
Published in:
SOUPS @ USENIX Security Symposium (2018)
Keyphrases
</>
key management
email
key management scheme
ad hoc networks
key distribution
secret key
security protocols
secure communication
resource constrained
digital signature
group communication
security services
response time
elliptic curve
secret sharing scheme
authentication scheme
web services