What is a Secure Email?
نویسندگان
چکیده
While security indicators for web browsers have been and still are an active research area, comparable indicators for secure email have received relatively little attention. However, similar questions emerge, for example, how users interpret existing indicators and whether there exist other indicators that are potentially more effective. In our paper, we review existing indicators used in the context of email encryption. Based thereof, we identify and study promising candidates and compare them using a survey instrument with 164 participants. Based on the results, postcards, mail envelopes and a torn envelope warrant further investigation. They offered an intuitive access and consistent interpretation on par with the dominant padlock metaphor.
منابع مشابه
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol
To construct a highly-assured implementation of secure communication channels we must have clear definitions of the security services, the channels, and under what assumptions these channels provide the desired services. We formally define secure channel services and develop a detailed example. The example is a core protocol common to a family of secure email systems. We identify the necessary ...
متن کاملMulti-Destination Secure Electronic Mail
this solution has a flaw which in certain circumstances allows the malicious construction of apparently authentic messages. Finally note that it is not the intention of the author to criticise what is after all only an RFC,l but rather to ensure that possible solutions to multi-destination secure message authentication problems are analysed with care. There are many lessons to be learnt from th...
متن کاملApplication-Scale Secure Multiparty Computation
Secure multiparty computation (MPC) permits a collection of parties to compute a collaborative result without any of the parties or compute servers gaining any knowledge about the inputs provided by other parties, except what can be determined from the output of the computation. In the form of MPC known as linear (or additive) sharing, computation proceeds on data that appears entirely random. ...
متن کاملRobust Transfroming Combiners from iO to FE
Indistinguishability Obfuscation (iO) has enabled an incredible number of new and exciting applications. However, our understanding of how to actually build secure iO remains in its infancy. While many candidate constructions have been published, some have been broken, and it is unclear which of the remaining candidates are secure. This work deals with the following basic question: Can we hedge...
متن کاملUsable Secure Email Communications - Criteria and Evaluation of Existing Approaches
Email communication has been used for many years and replaces more and more traditional letters. Compared to postal service the mail service is easier, faster and free of charge. However, the standard email is from a security point of view comparable to post cards and not to letters. While end-to-end secure email communication is possible with PGP and S/MIME, only few people use it due to a lac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017