Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
LoKey: leveraging the SMS network in decentralized, end-to-end trust establishment
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
Analyzing Internet e-mail date-spoofing
Digital Investigation: The International Journal of Digital Forensics & Incident Response
For some eyes only: protecting online information sharing
Proceedings of the third ACM conference on Data and application security and privacy
Hi-index | 0.00 |
The author's study on the usability and practical relevance of standard security mechanisms for email communication.