Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/1967
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAkman, Gamze-
dc.contributor.authorSelçuk, Ali Aydın-
dc.date.accessioned2019-07-10T14:42:43Z
dc.date.available2019-07-10T14:42:43Z
dc.date.issued2018-07
dc.identifier.citationAkman, G., & Selçuk, A. A. (2018, May). Usability of authentication mechanisms in secure messaging applications. Güvenli Mesajlaşma Uygulamalarında Kimlik Doğrulama ve Kullanılabilirlik. In 2018 26th Signal Processing and Communications Applications Conference (SIU) (pp. 1-4). IEEE.en_US
dc.identifier.urihttps://ieeexplore.ieee.org/abstract/document/8404644/-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/1967-
dc.description26th IEEE Signal Processing and Communications Applications Conference (2018 : Izmir; Turkey)
dc.description.abstractoday, the increasing popularity of instant messaging applications has introduced some security measures. One of these security measures is the authentication activity that users need to make. Authentication in instant messaging applications means verifying that someone is messaging with the right person. In studies conducted to date, users are not able to achieve full success in authentication activities. Therefore, in the four popular instant messaging applications, we conducted the authentication of the authentication key and the change of the authentication key and the user interaction with two different groups of 66 participants. Participants in the first group consisted of 18 participants who worked in the information sector and had no information security knowledge. Participants in the second group consist of 48 university students taking information security course. In the first phase, users were expected to compare the authentication keys. In the second phase, we investigated how users assessed it when the authentication key changed. We observed that, although the participants know that they need to authenticate the other user, they can ignore the authentication process.en_US
dc.description.sponsorshipAselsan,et al.,Huawei,IEEE Signal Processing Society,IEEE Turkey Section,Netas
dc.language.isotren_US
dc.publisherIEEEen_US
dc.relation.ispartof26th IEEE Signal Processing and Communications Applications Conferenceen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectSecure Chaten_US
dc.subjectAuthenticationen_US
dc.subjectUsable Securityen_US
dc.subjectUser Activityen_US
dc.subjectMessage Encryptionen_US
dc.subjectMan-in-the-middle Attacken_US
dc.subjectEnd to End Encryptionen_US
dc.titleUsability of Authentication Mechanisms in Secure Messaging Applicationsen_US
dc.title.alternativeGüvenli Mesajlaşma Uygulamalarında Kimlik Doğrulama ve Kullanılabilirliken_US
dc.typeConference Objecten_US
dc.departmentFaculties, Faculty of Engineering, Department of Computer Engineeringen_US
dc.departmentFakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümütr_TR
dc.identifier.startpage1
dc.identifier.endpage4
dc.identifier.scopus2-s2.0-85050799002en_US
dc.institutionauthorSelçuk, Ali Aydın-
dc.identifier.doi10.1109/SIU.2018.8404644-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
item.openairetypeConference Object-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.grantfulltextnone-
item.languageiso639-1tr-
item.cerifentitytypePublications-
item.fulltextNo Fulltext-
crisitem.author.dept02.3. Department of Computer Engineering-
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Show simple item record



CORE Recommender

Page view(s)

72
checked on Dec 23, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.