Balancing Security and Usability in Encrypted Email
dc.contributor.author | Bai, Wei | |
dc.contributor.author | Kim, Doowon | |
dc.contributor.author | Namara, Moses | |
dc.contributor.author | Qian, Yichen | |
dc.contributor.author | Gage Kelley, Patrick | |
dc.contributor.author | Mazurek, Michelle L. | |
dc.date.accessioned | 2022-05-09T21:10:17Z | |
dc.date.available | 2022-05-09T21:10:17Z | |
dc.date.issued | 2017 | |
dc.description.abstract | End-to-end encryption is the best way to protect digital messages. Historically, end-to-end encryption has been difficult for people to use, but recent tools have made it more broadly accessible, largely by employing key-directory services. These services sacrifice some security properties for convenience. A 52-person user study found that participants could learn to understand properties of different encryption models and make coherent assessments about when different trade offs might be appropriate. Participants recognized that a less convenient key exchange model was more secure overall, but considered the key-directory approach to have security sufficient for most everyday purposes. | en_US |
dc.identifier.citation | Bai, W., Kim, D., Namara, M., Qian, Y., Kelley, P. G., & Mazurek, M. L. (2017). Balancing security and usability in encrypted email. IEEE Internet Computing, 21(3), 30-38. | en_US |
dc.identifier.other | 1089-7801/17 | |
dc.identifier.uri | https://nru.uncst.go.ug/handle/123456789/3212 | |
dc.language.iso | en | en_US |
dc.publisher | IEEE Internet Computing | en_US |
dc.subject | Security | en_US |
dc.subject | Encrypted Email | en_US |
dc.title | Balancing Security and Usability in Encrypted Email | en_US |
dc.type | Article | en_US |