{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:17:07Z","timestamp":1743005827489,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030570422"},{"type":"electronic","value":"9783030570439"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57043-9_23","type":"book-chapter","created":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T12:03:10Z","timestamp":1597924990000},"page":"245-257","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Ghost Trace on the Wire? Using Key Evidence for Informed Decisions"],"prefix":"10.1007","author":[{"given":"Diana A.","family":"Vasile","sequence":"first","affiliation":[]},{"given":"Martin","family":"Kleppmann","sequence":"additional","affiliation":[]},{"given":"Daniel R.","family":"Thomas","sequence":"additional","affiliation":[]},{"given":"Alastair R.","family":"Beresford","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,21]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","unstructured":"Acer, M.E., et al.: Where the wild warnings are: Root causes of Chrome HTTPS certificate errors. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1407\u20131420. CCS 2017. ACM (2017). \nhttps:\/\/doi.org\/10.1145\/3133956.3134007","DOI":"10.1145\/3133956.3134007"},{"key":"23_CR2","doi-asserted-by":"publisher","unstructured":"Akhawe, D., Amann, B., Vallentin, M., Sommer, R.: Here\u2019s my cert, so trust me, maybe?: understanding TLS errors on the Web. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 59\u201370. WWW 2013. ACM (2013). \nhttps:\/\/doi.org\/10.1145\/2488388.2488395","DOI":"10.1145\/2488388.2488395"},{"key":"23_CR3","unstructured":"Apple Inc.: Apple reports first quarter results, February 2018. \nhttps:\/\/www.apple.com\/newsroom\/2018\/02\/apple-reports-first-quarter-results\n\n, \nhttps:\/\/perma.cc\/M6WV-Q4HK"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Cheshire, S., Krochmal, M.: Multicast DNS. IETF RFC 6762, 11 (2013)","DOI":"10.17487\/rfc6762"},{"key":"23_CR5","doi-asserted-by":"publisher","unstructured":"Clark, J., van Oorschot, P.C.: SoK: SSL and HTTPS: revisiting past challenges and evaluating certificate trust model enhancements. In: IEEE Symposium on Security and Privacy, pp. 511\u2013525 (2013). \nhttps:\/\/doi.org\/10.1109\/SP.2013.41","DOI":"10.1109\/SP.2013.41"},{"key":"23_CR6","unstructured":"De Cristofaro, E., Tsudik, G.: Practical private set intersection protocols with linear computational and bandwidth complexity. IACR Cryptology ePrint Archive 2009\/491 (2009)"},{"key":"23_CR7","doi-asserted-by":"publisher","unstructured":"Garfinkel, S.L., Miller, R.C.: Johnny 2: a user test of Key Continuity Management with S\/MIME and Outlook Express. In: Proceedings of the Symposium on Usable Privacy and Security, pp. 13\u201324. SOUPS 2005, ACM (2005). \nhttps:\/\/doi.org\/10.1145\/1073001.1073003","DOI":"10.1145\/1073001.1073003"},{"key":"23_CR8","unstructured":"Google Inc: Roughtime (2016). \nhttps:\/\/roughtime.googlesource.com\/roughtime\n\n, \nhttps:\/\/perma.cc\/C7TX-5ZK7"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-22137-8_23","volume-title":"Security Protocols XVI","author":"F Hao","year":"2011","unstructured":"Hao, F., Ryan, P.Y.A.: Password authenticated key exchange by juggling. In: Christianson, B., Malcolm, J.A., Matyas, V., Roe, M. (eds.) Security Protocols 2008. LNCS, vol. 6615, pp. 159\u2013171. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-22137-8_23"},{"key":"23_CR10","doi-asserted-by":"publisher","unstructured":"Herley, C.: So long, and no thanks for the externalities: the rational rejection of security advice by users. In: Proceedings of the New Security Paradigms Workshop, pp. 133\u2013144. NSPW, ACM (2009).\nhttps:\/\/doi.org\/10.1145\/1719030.1719050","DOI":"10.1145\/1719030.1719050"},{"key":"23_CR11","unstructured":"Hurst, R., Belvin, G.: Security through transparency, January 2017. \nhttps:\/\/security.googleblog.com\/2017\/01\/security-through-transparency.html\n\n, \nhttps:\/\/perma.cc\/ZJ33-NHH9"},{"issue":"8","key":"23_CR12","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/2668152.2668154","volume":"12","author":"B Laurie","year":"2014","unstructured":"Laurie, B.: Certificate transparency. ACM Queue 12(8), 10 (2014). \nhttps:\/\/doi.org\/10.1145\/2668152.2668154","journal-title":"ACM Queue"},{"key":"23_CR13","unstructured":"Levy, I., Robinson, C.: Principles for a more informed exceptional access debate, November 2018. \nhttps:\/\/www.lawfareblog.com\/principles-more-informed-exceptional-access-debate\n\n, \nhttps:\/\/perma.cc\/7RJK-FM32"},{"key":"23_CR14","unstructured":"Melara, M.: Why making Johnny\u2019s key management transparent is so challenging, March 2016). \nhttps:\/\/freedom-to-tinker.com\/2016\/03\/31\/why-making-johnnys-key-management-transparent-is-so-challenging\/\n\n, \nhttps:\/\/perma.cc\/RX2S-MZQH"},{"key":"23_CR15","unstructured":"Melara, M.S., Blankstein, A., Bonneau, J., Felten, E.W., Freedman, M.J.: CONIKS: bringing key transparency to end users. In: USENIX Security Symposium, pp. 383\u2013398 (2015)"},{"key":"23_CR16","unstructured":"Roberts, J.J., Rapp, N.: Nearly 4 million Bitcoins lost forever, new study says , November 2017. \nhttp:\/\/fortune.com\/2017\/11\/25\/lost-bitcoins\/"},{"key":"23_CR17","unstructured":"Ruoti, S., Andersen, J., Zappala, D., Seamons, K.: Why Johnny still, still can\u2019t encrypt: evaluating the usability of a modern PGP client. arXiv (2015). \nhttp:\/\/arxiv.org\/abs\/1510.08555"},{"key":"23_CR18","doi-asserted-by":"publisher","unstructured":"Ruoti, S., Kim, N., Burgon, B., van der Horst, T., Seamons, K.: Confused Johnny: when automatic encryption leads to confusion and mistakes. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS 2013, pp. 5:1\u20135:12. ACM (2013). \nhttps:\/\/doi.org\/10.1145\/2501604.2501609","DOI":"10.1145\/2501604.2501609"},{"key":"23_CR19","unstructured":"Sheng, S., Broderick, L., Hyland, J.J., Koranda, C.A.: Why Johnny still can\u2019t encrypt: evaluating the usability of email encryption software. In: Symposium On Usable Privacy and Security (SOUPS), pp. 3\u20134 (2006)"},{"key":"23_CR20","unstructured":"Sleevi, R.: Sustaining digital certificate security, October 2015. \nhttps:\/\/security.googleblog.com\/2015\/10\/sustaining-digital-certificate-security.html\n\n, \nhttps:\/\/perma.cc\/DV9F-8GUD"},{"key":"23_CR21","unstructured":"WhatsApp Inc.: Connecting one billion users every day, July 2017. \nhttps:\/\/blog.whatsapp.com\/10000631\/Connecting-One-Billion-Users-Every-Day\n\n, \nhttps:\/\/perma.cc\/8WZJ-Y5UT"},{"key":"23_CR22","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: USENIX Security Symposium, pp. 169\u2013184 (1999)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXVII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57043-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T12:24:36Z","timestamp":1597926276000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57043-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030570422","9783030570439"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57043-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"21 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Security Protocols","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cambridge International Workshop on Security Protocols","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cambridge","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spw2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cl.cam.ac.uk\/events\/spw\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}