Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/1957
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBıçakcı, Kemal-
dc.contributor.authorAltuncu, E.-
dc.contributor.authorSahkulubey, M. S.-
dc.contributor.authorKızılöz, H. E.-
dc.contributor.authorUzunay, Y.-
dc.date.accessioned2019-07-10T14:42:42Z
dc.date.available2019-07-10T14:42:42Z
dc.date.issued2018
dc.identifier.citationBicakci, K., Altuncu, E., Sahkulubey, M. S., Kiziloz, H. E., & Uzunay, Y. (2018, September). How Safe Is Safety Number? A User Study on SIGNAL’s Fingerprint and Safety Number Methods for Public Key Verification. In International Conference on Information Security (pp. 85-98). Springer, Cham.en_US
dc.identifier.issn3029743
dc.identifier.urihttps://link.springer.com/chapter/10.1007%2F978-3-319-99136-8_5-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/1957-
dc.description21st Information Security Conference, ISC 2018
dc.description.abstractCommunication security has become an indispensable demand of smartphone users. End-to-end encryption is the key factor for providing communication security, which mainly relies on public key cryptography. The main and unresolved issue for public key cryptography is to correctly match a public key with its owner. Failing to do so could lead to man-in-the-middle attacks. Different public key verification methods have been proposed in the literature. The methods which are based on verification by the users themselves are preferable with respect to cost and deployability than the methods such as digital certificates that involve the use of trusted third parties. One of these methods, fingerprinting was recently replaced by a method called safety number in the open source messaging application, SIGNAL. The developers of SIGNAL claimed this change would bring usability and security advantages however no formal user study was conducted supporting this claim. In this study, we compare the usability and security aspects of these two methods with a user study on 42 participants. The results indicate with significance that the safety number method leads to more successful results in less time for public key verification as compared to the fingerprint method.en_US
dc.language.isoenen_US
dc.publisherSpringer Verlagen_US
dc.relation.ispartofLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)en_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectAuthenticationen_US
dc.subjectBluetoothen_US
dc.subjectsecure communicationen_US
dc.titleHow Safe Is Safety Number? A User Study on SIGNAL’s Fingerprint and Safety Number Methods for Public Key Verificationen_US
dc.typeConference Objecten_US
dc.relation.ispartofseriesInternational Conference on Information Securityen_US
dc.departmentFaculties, Faculty of Engineering, Department of Computer Engineeringen_US
dc.departmentFakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümütr_TR
dc.identifier.volume11060
dc.identifier.startpage85
dc.identifier.endpage98
dc.identifier.wosWOS:000476658100005en_US
dc.identifier.scopus2-s2.0-85053994819en_US
dc.institutionauthorBıçakcı, Kemal-
dc.identifier.doi10.1007/978-3-319-99136-8_5-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.scopusqualityQ2-
item.cerifentitytypePublications-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.openairetypeConference Object-
item.fulltextNo Fulltext-
item.grantfulltextnone-
crisitem.author.dept02.3. Department of Computer Engineering-
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

WEB OF SCIENCETM
Citations

1
checked on Jan 20, 2024

Page view(s)

32
checked on Apr 15, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.