What is a Secure Email?

نویسندگان

  • Joscha Lausch
  • Oliver Wiese
  • Volker Roth
چکیده

While security indicators for web browsers have been and still are an active research area, comparable indicators for secure email have received relatively little attention. However, similar questions emerge, for example, how users interpret existing indicators and whether there exist other indicators that are potentially more effective. In our paper, we review existing indicators used in the context of email encryption. Based thereof, we identify and study promising candidates and compare them using a survey instrument with 164 participants. Based on the results, postcards, mail envelopes and a torn envelope warrant further investigation. They offered an intuitive access and consistent interpretation on par with the dominant padlock metaphor.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol

To construct a highly-assured implementation of secure communication channels we must have clear definitions of the security services, the channels, and under what assumptions these channels provide the desired services. We formally define secure channel services and develop a detailed example. The example is a core protocol common to a family of secure email systems. We identify the necessary ...

متن کامل

Multi-Destination Secure Electronic Mail

this solution has a flaw which in certain circumstances allows the malicious construction of apparently authentic messages. Finally note that it is not the intention of the author to criticise what is after all only an RFC,l but rather to ensure that possible solutions to multi-destination secure message authentication problems are analysed with care. There are many lessons to be learnt from th...

متن کامل

Application-Scale Secure Multiparty Computation

Secure multiparty computation (MPC) permits a collection of parties to compute a collaborative result without any of the parties or compute servers gaining any knowledge about the inputs provided by other parties, except what can be determined from the output of the computation. In the form of MPC known as linear (or additive) sharing, computation proceeds on data that appears entirely random. ...

متن کامل

Robust Transfroming Combiners from iO to FE

Indistinguishability Obfuscation (iO) has enabled an incredible number of new and exciting applications. However, our understanding of how to actually build secure iO remains in its infancy. While many candidate constructions have been published, some have been broken, and it is unclear which of the remaining candidates are secure. This work deals with the following basic question: Can we hedge...

متن کامل

Usable Secure Email Communications - Criteria and Evaluation of Existing Approaches

Email communication has been used for many years and replaces more and more traditional letters. Compared to postal service the mail service is easier, faster and free of charge. However, the standard email is from a security point of view comparable to post cards and not to letters. While end-to-end secure email communication is possible with PGP and S/MIME, only few people use it due to a lac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017