Skip to main content

Showing 1–3 of 3 results for author: Stobert, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:1802.04351  [pdf, other

    cs.CR cs.CY cs.ET cs.HC

    A first look at the usability of bitcoin key management

    Authors: Shayan Eskandari, Jeremy Clark, David Barrera, Elizabeth Stobert

    Abstract: Bitcoin users are directly or indirectly forced to deal with public key cryptography, which has a number of security and usability challenges that differ from the password-based authentication underlying most online banking services. Users must ensure that keys are simultaneously accessible, resistant to digital theft and resilient to loss. In this paper, we contribute an evaluation framework for… ▽ More

    Submitted 12 February, 2018; originally announced February 2018.

    Comments: 10 Pages, USEC 15: NDSS Workshop on Usable Security (USEC) 2015, San Diego, CA, USA, February 8, 2015, Internet Society

  2. arXiv:1610.03647  [pdf, other

    cs.CR cs.CY

    Exploring Website Location as a Security Indicator

    Authors: Der-Yeuan Yu, Elizabeth Stobert, David Basin, Srdjan Capkun

    Abstract: Authenticating websites is an ongoing problem for users. Recent proposals have suggested strengthening current server authentication methods by incorporating website location as a comprehensible additional trust factor. In this work, we explore users' acceptance of location information and how it affects decision-making for security and privacy. We conducted a series of qualitative interviews to l… ▽ More

    Submitted 1 March, 2018; v1 submitted 12 October, 2016; originally announced October 2016.

    Comments: 13 pages, 4 figures, 7 tables. Published at the 2018 NDSS Workshop on Usable Security (USEC)

  3. arXiv:1511.02119  [pdf, other

    cs.CR

    OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices

    Authors: Andrew Paverd, Sandeep Tamrakar, Hoang Long Nguyen, Praveen Kumar Pendyala, Thien Duc Nguyen, Elizabeth Stobert, Tommi Gröndahl, N. Asokan, Ahmad-Reza Sadeghi

    Abstract: Cloud storage services like Dropbox and Google Drive are widely used by individuals and businesses. Two attractive features of these services are 1) the automatic synchronization of files between multiple client devices and 2) the possibility to share files with other users. However, privacy of cloud data is a growing concern for both individuals and businesses. Encrypting data on the client-side… ▽ More

    Submitted 29 December, 2016; v1 submitted 6 November, 2015; originally announced November 2015.