Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/1967
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Akman, Gamze | - |
dc.contributor.author | Selçuk, Ali Aydın | - |
dc.date.accessioned | 2019-07-10T14:42:43Z | |
dc.date.available | 2019-07-10T14:42:43Z | |
dc.date.issued | 2018-07 | |
dc.identifier.citation | Akman, G., & Selçuk, A. A. (2018, May). Usability of authentication mechanisms in secure messaging applications. Güvenli Mesajlaşma Uygulamalarında Kimlik Doğrulama ve Kullanılabilirlik. In 2018 26th Signal Processing and Communications Applications Conference (SIU) (pp. 1-4). IEEE. | en_US |
dc.identifier.uri | https://ieeexplore.ieee.org/abstract/document/8404644/ | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/1967 | - |
dc.description | 26th IEEE Signal Processing and Communications Applications Conference (2018 : Izmir; Turkey) | |
dc.description.abstract | oday, the increasing popularity of instant messaging applications has introduced some security measures. One of these security measures is the authentication activity that users need to make. Authentication in instant messaging applications means verifying that someone is messaging with the right person. In studies conducted to date, users are not able to achieve full success in authentication activities. Therefore, in the four popular instant messaging applications, we conducted the authentication of the authentication key and the change of the authentication key and the user interaction with two different groups of 66 participants. Participants in the first group consisted of 18 participants who worked in the information sector and had no information security knowledge. Participants in the second group consist of 48 university students taking information security course. In the first phase, users were expected to compare the authentication keys. In the second phase, we investigated how users assessed it when the authentication key changed. We observed that, although the participants know that they need to authenticate the other user, they can ignore the authentication process. | en_US |
dc.description.sponsorship | Aselsan,et al.,Huawei,IEEE Signal Processing Society,IEEE Turkey Section,Netas | |
dc.language.iso | tr | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartof | 26th IEEE Signal Processing and Communications Applications Conference | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Secure Chat | en_US |
dc.subject | Authentication | en_US |
dc.subject | Usable Security | en_US |
dc.subject | User Activity | en_US |
dc.subject | Message Encryption | en_US |
dc.subject | Man-in-the-middle Attack | en_US |
dc.subject | End to End Encryption | en_US |
dc.title | Usability of Authentication Mechanisms in Secure Messaging Applications | en_US |
dc.title.alternative | Güvenli Mesajlaşma Uygulamalarında Kimlik Doğrulama ve Kullanılabilirlik | en_US |
dc.type | Conference Object | en_US |
dc.department | Faculties, Faculty of Engineering, Department of Computer Engineering | en_US |
dc.department | Fakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | tr_TR |
dc.identifier.startpage | 1 | |
dc.identifier.endpage | 4 | |
dc.identifier.scopus | 2-s2.0-85050799002 | en_US |
dc.institutionauthor | Selçuk, Ali Aydın | - |
dc.identifier.doi | 10.1109/SIU.2018.8404644 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
item.openairetype | Conference Object | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.grantfulltext | none | - |
item.languageiso639-1 | tr | - |
item.cerifentitytype | Publications | - |
item.fulltext | No Fulltext | - |
crisitem.author.dept | 02.3. Department of Computer Engineering | - |
Appears in Collections: | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
CORE Recommender
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.