{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:43:38Z","timestamp":1743129818422,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319986531"},{"type":"electronic","value":"9783319986548"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99136-8_5","type":"book-chapter","created":{"date-parts":[[2018,8,14]],"date-time":"2018-08-14T08:39:41Z","timestamp":1534235981000},"page":"85-98","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["How Safe Is Safety Number? A User Study on SIGNAL\u2019s Fingerprint and Safety Number Methods for Public Key Verification"],"prefix":"10.1007","author":[{"given":"Kemal","family":"Bicakci","sequence":"first","affiliation":[]},{"given":"Enes","family":"Altuncu","sequence":"additional","affiliation":[]},{"given":"Muhammet Sakir","family":"Sahkulubey","sequence":"additional","affiliation":[]},{"given":"Hakan Ezgi","family":"Kiziloz","sequence":"additional","affiliation":[]},{"given":"Yusuf","family":"Uzunay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,15]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Bicakci, K., Atalay, N.B., Kiziloz, H.E.: Johnny in internet caf\u00e9: user study and exploration of password autocomplete in web browsers. In: Proceedings of the 7th ACM Workshop on Digital Identity Management, pp. 33\u201342. ACM (2011)","DOI":"10.1145\/2046642.2046652"},{"key":"5_CR2","unstructured":"Budington, B.: Whatsapp rolls out end-to-end encryption to its over one billion users (2016). \n                      https:\/\/www.eff.org\/deeplinks\/2016\/04\/whatsapp-rolls-out-end-end-encryption-its-1bn-users\n                      \n                    . Accessed 20 Apr 2018"},{"key":"5_CR3","unstructured":"Fry, A., Chiasson, S., Somayaji, A.: Not sealed but delivered: the (un) usability of s\/mime today. In: Annual Symposium on Information Assurance and Secure Knowledge Management (ASIA 2012), Albany, NY (2012)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Garfinkel, S.L., Margrave, D., Schiller, J.I., Nordlander, E., Miller, R.C.: How to make secure email easier to use. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 701\u2013710. ACM (2005)","DOI":"10.1145\/1054972.1055069"},{"key":"5_CR5","unstructured":"Marlinspike, M.: Safety number updates (2016). \n                      https:\/\/signal.org\/blog\/safety-number-updates\/\n                      \n                    . Accessed 20 Apr 2018"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-319-08506-7_13","volume-title":"Privacy Enhancing Technologies","author":"K Renaud","year":"2014","unstructured":"Renaud, K., Volkamer, M., Renkema-Padmos, A.: Why doesn\u2019t Jane protect her privacy? In: De Cristofaro, E., Murdoch, S.J. (eds.) PETS 2014. LNCS, vol. 8555, pp. 244\u2013262. Springer, Cham (2014). \n                      https:\/\/doi.org\/10.1007\/978-3-319-08506-7_13"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Schr\u00f6der, S., Huber, M., Wind, D., Rottermanner, C.: When signal hits the fan: on the usability and security of state-of-the-art secure mobile messaging. In: First European Workshop on Usable Security (EuroUSEC 2016) (2016)","DOI":"10.14722\/eurousec.2016.23012"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Tan, J., Bauer, L., Bonneau, J., Cranor, L.F., Thomas, J., Ur, B.: Can unicorns help users compare crypto key fingerprints? In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 3787\u20133798. ACM (2017)","DOI":"10.1145\/3025453.3025733"},{"key":"5_CR9","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny can\u2019t encrypt: A usability evaluation of PGP 5.0. In: USENIX Security Symposium, vol. 348 (1999)"}],"container-title":["Lecture Notes in Computer Science","Developments in Language Theory"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99136-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,2]],"date-time":"2018-09-02T19:24:34Z","timestamp":1535916274000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-99136-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319986531","9783319986548"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99136-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}