Authentication ceremonies detect and mitigate Man-in-the-Middle (MitM) attacks on end-to-end encrypted messengers, such as Signal, WhatsApp, or Threema. However, prior work found that adoption remains low as non-expert users have difficulties using them correctly. Anecdotal evidence suggests that security researchers also have trouble authenticating others. Since their issues are probably unrelated to user comprehension or usability, the root causes may lie deeper. This work explores these root causes using autoethnography. The first author kept a five-month research diary of their experience with authentication ceremonies. The results uncover points of failure while planning and conducting authentication ceremonies. They include cogniti...
Increasingly evident safety risks due to attacks on safety-critical devices are causing new requirem...
Authentication has become a critical step to gain access to services such as on-line banking, e-comm...
Today security concerns are on the rise in all area such as banks,government organizations,business ...
PurposeDespite the widespread use of authentication schemes and the rapid emergence of novel authent...
Computer-based information systems in general, and Internet e-commerce and e-business systems in par...
The security aspect that the computer user encounters most often is the password prompt - a demand t...
17 USC 105 interim-entered record; under review.The article of record as published may be found at h...
Nowadays many systems require end users to authenticate themselves. Authentication is one of the sec...
26th IEEE Signal Processing and Communications Applications Conference (2018 : Izmir; Turkey)oday, t...
The Objectives were it to inform the work of outsider Even Slightly hip readers of information techn...
In information systems, authentication involves, traditionally, sharing a secret with the authentica...
Phishing takes advantage of the way humans interact with computers or interpret messages. A security...
On the Internet, there is an uneasy tension between the security and usability of authentication me...
Thesis (Ph.D.)--University of Washington, 2019Humans have used passwords for access control since an...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
Increasingly evident safety risks due to attacks on safety-critical devices are causing new requirem...
Authentication has become a critical step to gain access to services such as on-line banking, e-comm...
Today security concerns are on the rise in all area such as banks,government organizations,business ...
PurposeDespite the widespread use of authentication schemes and the rapid emergence of novel authent...
Computer-based information systems in general, and Internet e-commerce and e-business systems in par...
The security aspect that the computer user encounters most often is the password prompt - a demand t...
17 USC 105 interim-entered record; under review.The article of record as published may be found at h...
Nowadays many systems require end users to authenticate themselves. Authentication is one of the sec...
26th IEEE Signal Processing and Communications Applications Conference (2018 : Izmir; Turkey)oday, t...
The Objectives were it to inform the work of outsider Even Slightly hip readers of information techn...
In information systems, authentication involves, traditionally, sharing a secret with the authentica...
Phishing takes advantage of the way humans interact with computers or interpret messages. A security...
On the Internet, there is an uneasy tension between the security and usability of authentication me...
Thesis (Ph.D.)--University of Washington, 2019Humans have used passwords for access control since an...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
Increasingly evident safety risks due to attacks on safety-critical devices are causing new requirem...
Authentication has become a critical step to gain access to services such as on-line banking, e-comm...
Today security concerns are on the rise in all area such as banks,government organizations,business ...