Sciweavers

72 search results - page 1 / 15
» A User Study Design for Comparing the Security of Registrati...
Sort
View
NSDI
2008
13 years 6 months ago
A User Study Design for Comparing the Security of Registration Protocols
We present the design of a user study for comparing the security of two registration mechanisms for initializing credentials in machine authentication protocols, such as SiteKey. ...
Chris Karlof, J. Doug Tygar, David Wagner
SOUPS
2009
ACM
13 years 11 months ago
Conditioned-safe ceremonies and a user study of an application to web authentication
We introduce the notion of a conditioned-safe ceremony. A “ceremony” is similar to the conventional notion of a protocol, except that a ceremony explicitly includes human part...
Chris Karlof, J. D. Tygar, David Wagner
IJACT
2008
86views more  IJACT 2008»
13 years 4 months ago
Securing group key exchange against strong corruptions and key registration attacks
: In Group Key Exchange (GKE) protocols, users usually extract the group key using some auxiliary (ephemeral) secret information generated during the execution. Strong corruptions ...
Emmanuel Bresson, Mark Manulis
TMC
2012
11 years 7 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
SOUPS
2009
ACM
13 years 11 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe