International audienceSeveral end-to-end encryption technologies for emails such as PGP and S/MIME exist since decades. However, end-to-end encryption is barely applied. To understand why users hesitate to secure their email communication and which usability issues they face with PGP, S/MIME as well as with pEp (Pretty Easy Privacy), a fairly new technology, we conducted an online survey and user testing. We found that more than 60% of e-mail users are unaware of the existence of such encryption technologies and never tried to use one. We observed that above all, users are overwhelmed with the management of public keys and struggle with the setup of encryption technology in their mail software. Even though users struggle to put email encryp...
In this paper I present a study on “S/MIME”, which has become the industry standard for secure email...
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based ...
Email has evolved into one of the most important methods of communication for any individual and org...
International audienceSeveral end-to-end encryption technologies for emails such as PGP and S/MIME e...
International audienceThis paper presents the results of a usability study focused on three end-to-e...
This paper presents the results of a usability study focused on three end-to-end encryption technolo...
Email is one of the main communication tools and has seen significant adoption in the past decades. ...
Existing end-to-end-encrypted (E2EE) email systems, mainly PGP, have long been evaluated in controll...
Despite the rise of alternatives, email remains integral to technology-mediated communication. To pr...
Despite the rise of alternatives, email remains integral to technology-mediated communication. To pr...
Despite the rise of alternatives, email remains integral to technology-mediated communication. To pr...
End-to-end encryption has been heralded by privacy and security researchers as an effective defence ...
Some of us might have had this experience: because of privacy concerns, we decided to use PGP or S/M...
End-to-end encryption has been heralded by privacy and security researchers as an effective defence ...
Support for strong electronic mail security is widely available yet only few communicants appear to ...
In this paper I present a study on “S/MIME”, which has become the industry standard for secure email...
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based ...
Email has evolved into one of the most important methods of communication for any individual and org...
International audienceSeveral end-to-end encryption technologies for emails such as PGP and S/MIME e...
International audienceThis paper presents the results of a usability study focused on three end-to-e...
This paper presents the results of a usability study focused on three end-to-end encryption technolo...
Email is one of the main communication tools and has seen significant adoption in the past decades. ...
Existing end-to-end-encrypted (E2EE) email systems, mainly PGP, have long been evaluated in controll...
Despite the rise of alternatives, email remains integral to technology-mediated communication. To pr...
Despite the rise of alternatives, email remains integral to technology-mediated communication. To pr...
Despite the rise of alternatives, email remains integral to technology-mediated communication. To pr...
End-to-end encryption has been heralded by privacy and security researchers as an effective defence ...
Some of us might have had this experience: because of privacy concerns, we decided to use PGP or S/M...
End-to-end encryption has been heralded by privacy and security researchers as an effective defence ...
Support for strong electronic mail security is widely available yet only few communicants appear to ...
In this paper I present a study on “S/MIME”, which has become the industry standard for secure email...
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based ...
Email has evolved into one of the most important methods of communication for any individual and org...