{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T04:35:11Z","timestamp":1769315711696,"version":"3.49.0"},"reference-count":15,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1816929"],"award-info":[{"award-number":["CNS-1816929"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1109\/msec.2020.3039727","type":"journal-article","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T20:56:41Z","timestamp":1608670601000},"page":"29-37","source":"Crossref","is-referenced-by-count":12,"title":["Secure Messaging Authentication Ceremonies Are Broken"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5586-5261","authenticated-orcid":false,"given":"Amir","family":"Herzberg","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, University of Connecticut, Storrs, Connecticut United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7421-1850","authenticated-orcid":false,"given":"Hemi","family":"Leibowitz","sequence":"additional","affiliation":[{"name":"Computer Science, Bar-Ilan University, Ramat Gan, Israel, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1482-492X","authenticated-orcid":false,"given":"Kent","family":"Seamons","sequence":"additional","affiliation":[{"name":"Computer Science, Brigham Young University, Provo, Utah 84602 United States"}]},{"given":"Elham","family":"Vaziripour","sequence":"additional","affiliation":[{"name":"Computer Science, Brigham Young University, Provo, Utah United States"}]},{"given":"Justin","family":"Wu","sequence":"additional","affiliation":[{"name":"Computer Science, Brigham Young University, Provo, Utah United States"}]},{"given":"Daniel","family":"Zappala","sequence":"additional","affiliation":[{"name":"Computer Science, Brigham Young University, Provo, Utah 84602 United States"}]}],"member":"263","reference":[{"key":"ref10","first-page":"47","article-title":"Action needed! Helping users find and complete the authentication ceremony in Signal","author":"vaziripour","year":"0","journal-title":"Proc Symp Usable Privacy and Security (SOUPS ' 08"},{"key":"ref11","first-page":"137","article-title":"Something isn&#x2019;t secure, but I&#x2019;m not sure how that translates into a problem&#x201D;: Promoting autonomy by designing for understanding in Signal","author":"wu","year":"0","journal-title":"Proc Symp Usable Privacy and Security (SOUPS ' 08"},{"key":"ref12","first-page":"395","article-title":"When is a tree really a truck? Exploring mental models of encryption","author":"wu","year":"0","journal-title":"Proc Symp Usable Privacy and Security (SOUPS ' 08"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00023"},{"key":"ref14","first-page":"89","article-title":"Computer security and privacy in the interactions between victim service providers and human trafficking survivors","author":"chen","year":"0","journal-title":"Proc Usenix Security Symp"},{"key":"ref15","first-page":"383","article-title":"CONIKS: Bringing key transparency to end users","author":"melara","year":"0","journal-title":"Proc Usenix Security Symp"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2016.23012"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.22"},{"key":"ref6","first-page":"29","article-title":"Is that you, Alice? A usability study of the authentication ceremony of secure messaging applications","author":"vaziripour","year":"0","journal-title":"Proc Symp Usable Privacy and Security (SOUPS ' 08"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3046055.3046059"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025733"},{"key":"ref7","first-page":"193","article-title":"An empirical study of textual key-fingerprint representations","author":"dechand","year":"2016","journal-title":"Proc 25th Usenix Security Symp"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-020-09360-1"},{"key":"ref9","author":"marlinspike","year":"2016","journal-title":"Safety number updates"},{"key":"ref1","first-page":"169","article-title":"Why Johnny can&#x2019;t encrypt: A usability evaluation of PGP 5.0","author":"whitten","year":"0","journal-title":"Proc 8th Usenix Security Symp"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8013\/9382368\/9303352-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8013\/9382368\/09303352.pdf?arnumber=9303352","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:23Z","timestamp":1652194343000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9303352\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":15,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/msec.2020.3039727","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"value":"1540-7993","type":"print"},{"value":"1558-4046","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3]]}}}