An Empirical Study of Textual Key-Fingerprint Representations

  title={An Empirical Study of Textual Key-Fingerprint Representations},
  author={Sergej Dechand and Dominik Sch{\"u}rmann and Karoline Busse and Yasemin Acar and Sascha Fahl and Matthew Smith},
  booktitle={USENIX Security Symposium},
No Peter Gutman, 2011 

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 10 extracted citations

Can Unicorns Help Users Compare Crypto Key Fingerprints?

CHI • 2017
View 8 Excerpts
Highly Influenced

More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema

2018 IEEE European Symposium on Security and Privacy (EuroS&P) • 2018
View 1 Excerpt

Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses

ACM Conference on Computer and Communications Security • 2018
View 3 Excerpts

Establishing trust in heterogeneous networks

2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) • 2017
View 1 Excerpt


Publications referenced by this paper.
Showing 1-10 of 35 references

A study of user-friendly hash comparison schemes

HSIAO, LIN H.-C, +10 authors B.-Y
In Computer Security Applications Conference, • 2009
View 5 Excerpts
Highly Influenced

Do users verify SSH keys

USENIX;login: 36, • 2011
View 3 Excerpts
Highly Influenced


View 1 Excerpt

Secure Messaging Scorecard

ELECTRONIC FRONTIER FOUNDATION secure-messaging-scorecard, • 2014
View 1 Excerpt

Similar Papers

Loading similar papers…