{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T09:10:41Z","timestamp":1771233041995,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,12,5]],"date-time":"2016-12-05T00:00:00Z","timestamp":1480896000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Israeli Ministry of Science and Technology"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,12,5]]},"DOI":"10.1145\/3046055.3046059","type":"proceedings-article","created":{"date-parts":[[2017,9,13]],"date-time":"2017-09-13T16:20:10Z","timestamp":1505319610000},"page":"17-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["Can Johnny finally encrypt?"],"prefix":"10.1145","author":[{"given":"Amir","family":"Herzberg","sequence":"first","affiliation":[{"name":"Bar-Ilan University, Israel"}]},{"given":"Hemi","family":"Leibowitz","sequence":"additional","affiliation":[{"name":"Bar-Ilan University, Israel"}]}],"member":"320","published-online":{"date-parts":[[2016,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Scorecard Update: We Cannot Credit Skype For End-to-end Encryption. https:\/\/www.eff.org\/deeplinks\/2014\/11\/scorecard-update-we-cannot-credit-skype-end-end-encryption.  Scorecard Update: We Cannot Credit Skype For End-to-end Encryption. https:\/\/www.eff.org\/deeplinks\/2014\/11\/scorecard-update-we-cannot-credit-skype-end-end-encryption."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2836041.2836044"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"S. B. Barnes. A privacy paradox: Social networking in the united states. First Monday 11(9) 2006.  S. B. Barnes. A privacy paradox: Social networking in the united states. First Monday 11(9) 2006.","DOI":"10.5210\/fm.v11i9.1394"},{"key":"e_1_3_2_1_4_1","unstructured":"P. R. Center. Americans' privacy strategies post-Snowden 2015. URL http:\/\/pewrsr.ch\/1LiLHAM.  P. R. Center. Americans' privacy strategies post-Snowden 2015. URL http:\/\/pewrsr.ch\/1LiLHAM."},{"key":"e_1_3_2_1_5_1","unstructured":"R. B. Cialdini. Influence: Science and practice volume 4. Pearson Education Boston MA 2009.  R. B. Cialdini. Influence: Science and practice volume 4. Pearson Education Boston MA 2009."},{"key":"e_1_3_2_1_6_1","unstructured":"CIGI-Ipsos. 2016 cigi-ipsos global survey on internet security and trust 2016. URL https:\/\/www.cigionline.org\/internet-survey-2016.  CIGI-Ipsos. 2016 cigi-ipsos global survey on internet security and trust 2016. URL https:\/\/www.cigionline.org\/internet-survey-2016."},{"key":"e_1_3_2_1_7_1","volume-title":"USENIX Security Symposium. USENIX Association","author":"Clark S.","year":"2011"},{"key":"e_1_3_2_1_8_1","unstructured":"K. Cohn-Gordon C. Cremers B. Dowling L. Garratt and D. Stebila. A formal security analysis of the signal messaging protocol. Technical report PDF). Cryptology ePrint Archive. International Association for Cryptologic Research (IACR).  K. Cohn-Gordon C. Cremers B. Dowling L. Garratt and D. Stebila. A formal security analysis of the signal messaging protocol. Technical report PDF). Cryptology ePrint Archive. International Association for Cryptologic Research (IACR)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1979742.1979575"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2007.09.002"},{"key":"e_1_3_2_1_11_1","volume-title":"WEIS","author":"Dingledine R.","year":"2006"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"V. Dukhovni. Opportunistic security: Some protection most of the time. Technical report 2014.  V. Dukhovni. Opportunistic security: Some protection most of the time. Technical report 2014.","DOI":"10.17487\/rfc7435"},{"key":"e_1_3_2_1_13_1","unstructured":"A. Elliott and S. Brody. New yorkers on mobile messaging and implications for privacy. Technical report. URL https:\/\/simplysecure.org\/resources\/techreports\/NYC15-MobMsg.pdf.  A. Elliott and S. Brody. New yorkers on mobile messaging and implications for privacy. Technical report. URL https:\/\/simplysecure.org\/resources\/techreports\/NYC15-MobMsg.pdf."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500428"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.41"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073003"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.104"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1391949.1391950"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1274531.1274548"},{"key":"e_1_3_2_1_20_1","first-page":"1004","volume":"2014","author":"Melara M. S.","year":"2014","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2709096.2709109"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501609"},{"key":"e_1_3_2_1_23_1","unstructured":"S. Ruoti J. Andersen D. Zappala and K. E. Seamons. Why Johnny still still can't encrypt: Evaluating the usability of a modern PGP client. CoRR abs\/1510.08555 2015. URL http:\/\/arxiv.org\/abs\/1510.08555.  S. Ruoti J. Andersen D. Zappala and K. E. Seamons. Why Johnny still still can't encrypt: Evaluating the usability of a modern PGP client. CoRR abs\/1510.08555 2015. URL http:\/\/arxiv.org\/abs\/1510.08555."},{"key":"e_1_3_2_1_24_1","volume-title":"5th Annual PKI R&D Workshop","author":"Sasse M.","year":"2006"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519003"},{"key":"e_1_3_2_1_26_1","volume-title":"NDSS","author":"Schrittwieser S.","year":"2012"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"S. Schr\u00f6der M. Huber D. Wind and C. Rottermanner. When signal hits the fan: On the usability and security of state-of-the-art secure mobile messaging. 2016.  S. Schr\u00f6der M. Huber D. Wind and C. Rottermanner. When signal hits the fan: On the usability and security of state-of-the-art secure mobile messaging. 2016.","DOI":"10.14722\/eurousec.2016.23012"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.22"},{"key":"e_1_3_2_1_29_1","first-page":"169","volume-title":"Proceedings of the 8th USENIX Security Symposium (SECURITY-99)","author":"Whitten A.","year":"1999"}],"event":{"name":"STAST '16: Socio-Technical Aspects in Security and Trust","location":"Los Angeles California","acronym":"STAST '16"},"container-title":["Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3046055.3046059","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3046055.3046059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:24Z","timestamp":1750218624000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3046055.3046059"}},"subtitle":["evaluating E2E-encryption in popular IM applications"],"short-title":[],"issued":{"date-parts":[[2016,12,5]]},"references-count":29,"alternative-id":["10.1145\/3046055.3046059","10.1145\/3046055"],"URL":"https:\/\/doi.org\/10.1145\/3046055.3046059","relation":{},"subject":[],"published":{"date-parts":[[2016,12,5]]},"assertion":[{"value":"2016-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}