{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:57:28Z","timestamp":1755838648350,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134610","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"499-511","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["On the Pitfalls of End-to-End Encrypted Communications"],"prefix":"10.1145","author":[{"given":"Maliheh","family":"Shirvanian","sequence":"first","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, Alabama"}]},{"given":"Nitesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, Alabama"}]},{"given":"Jesvin James","family":"George","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, Alabama"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. How The NSA Pulls Off Man-In-The-Middle Attacks: With Help From The Telcos. ({n. d.}). https:\/\/goo.gl\/Kg4ysn.  {n. d.}. How The NSA Pulls Off Man-In-The-Middle Attacks: With Help From The Telcos. ({n. d.}). https:\/\/goo.gl\/Kg4ysn."},{"key":"e_1_3_2_1_2_1","unstructured":"{n. d.}. ChatSecure Encrypted Messenger. ({n. d.}). https:\/\/chatsecure.org\/.  {n. d.}. ChatSecure Encrypted Messenger. ({n. d.}). https:\/\/chatsecure.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"{n. d.}. Diffie-Hellman key exchange. https:\/\/en.wikipedia.org\/wiki\/Diffie-Hellman_key_exchange. ({n. d.}).  {n. d.}. Diffie-Hellman key exchange. https:\/\/en.wikipedia.org\/wiki\/Diffie-Hellman_key_exchange. ({n. d.})."},{"key":"e_1_3_2_1_4_1","unstructured":"{n. d.}. Double Ratchet Algorithm. https:\/\/github.com\/trevp\/double_ratchet\/wiki. ({n. d.}).  {n. d.}. Double Ratchet Algorithm. https:\/\/github.com\/trevp\/double_ratchet\/wiki. ({n. d.})."},{"key":"e_1_3_2_1_5_1","unstructured":"{n. d.}. Facebook Messenger. https:\/\/www.messenger.com\/. ({n. d.}).  {n. d.}. Facebook Messenger. https:\/\/www.messenger.com\/. ({n. d.})."},{"key":"e_1_3_2_1_6_1","unstructured":"{n. d.}. Google Allo. https:\/\/allo.google.com\/. ({n. d.}).  {n. d.}. Google Allo. https:\/\/allo.google.com\/. ({n. d.})."},{"key":"e_1_3_2_1_7_1","unstructured":"{n. d.}. Off-the-Record Messaging Protocol version 3. https:\/\/otr.cypherpunks.ca\/Protocol-v3-4.0.0.html. ({n. d.}).  {n. d.}. Off-the-Record Messaging Protocol version 3. https:\/\/otr.cypherpunks.ca\/Protocol-v3-4.0.0.html. ({n. d.})."},{"key":"e_1_3_2_1_8_1","unstructured":"{n. d.}. Open Whisper Systems. https:\/\/whispersystems.org\/. ({n. d.}).  {n. d.}. Open Whisper Systems. https:\/\/whispersystems.org\/. ({n. d.})."},{"key":"e_1_3_2_1_9_1","unstructured":"{n. d.}. Secret chats end-to-end encryption. https:\/\/core.telegram.org\/api\/end-to-end. ({n. d.}).  {n. d.}. Secret chats end-to-end encryption. https:\/\/core.telegram.org\/api\/end-to-end. ({n. d.})."},{"key":"e_1_3_2_1_10_1","unstructured":"{n. d.}. Telegram Messenger. https:\/\/telegram.org\/. ({n. d.}).  {n. d.}. Telegram Messenger. https:\/\/telegram.org\/. ({n. d.})."},{"key":"e_1_3_2_1_11_1","unstructured":"{n. d.}. Threema - Seriously secure messaging. https:\/\/threema.ch. ({n. d.}).  {n. d.}. Threema - Seriously secure messaging. https:\/\/threema.ch. ({n. d.})."},{"key":"e_1_3_2_1_12_1","unstructured":"{n. d.}. Viber. https:\/\/www.viber.com. ({n. d.}).  {n. d.}. Viber. https:\/\/www.viber.com. ({n. d.})."},{"key":"e_1_3_2_1_13_1","unstructured":"{n. d.}. Viber Encryption Overview. ({n. d.}). https:\/\/www.viber.com\/en\/security-overview.  {n. d.}. Viber Encryption Overview. ({n. d.}). https:\/\/www.viber.com\/en\/security-overview."},{"key":"e_1_3_2_1_14_1","unstructured":"{n. d.}. WhatsApp. https:\/\/www.whatsapp.com\/. ({n. d.}).  {n. d.}. WhatsApp. https:\/\/www.whatsapp.com\/. ({n. d.})."},{"key":"e_1_3_2_1_15_1","unstructured":"{n. d.}. Wickr Secure Messenger. ({n. d.}). https:\/\/www.wickr.com\/.  {n. d.}. Wickr Secure Messenger. ({n. d.}). https:\/\/www.wickr.com\/."},{"key":"e_1_3_2_1_16_1","unstructured":"{n. d.}. ZORG - An Implementation of the ZRTP Protocol. ({n. d.}). http:\/\/www.zrtp.org\/.  {n. d.}. ZORG - An Implementation of the ZRTP Protocol. ({n. d.}). http:\/\/www.zrtp.org\/."},{"key":"e_1_3_2_1_17_1","article-title":"Determining what individual SUS scores mean: Adding an adjective rating scale","volume":"4","author":"Bangor Aaron","year":"2009","unstructured":"Aaron Bangor , Philip Kortum , and James Miller . 2009 . Determining what individual SUS scores mean: Adding an adjective rating scale . Journal of usability studies 4 , 3 (2009). Aaron Bangor, Philip Kortum, and James Miller. 2009. Determining what individual SUS scores mean: Adding an adjective rating scale. Journal of usability studies 4, 3 (2009).","journal-title":"Journal of usability studies"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1947337.1947361"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029200"},{"key":"e_1_3_2_1_20_1","volume-title":"SUS-A quick and dirty usability scale. Usability evaluation in industry","author":"Brooke John","year":"1996","unstructured":"John Brooke . 1996. SUS-A quick and dirty usability scale. Usability evaluation in industry ( 1996 ). John Brooke. 1996. SUS-A quick and dirty usability scale. Usability evaluation in industry (1996)."},{"key":"e_1_3_2_1_21_1","unstructured":"Sergej Dechand Dominik Sch\u00fcrmann TU IBR Karoline Busse Yasemin Acar Sascha Fahl and Matthew Smith. {n. d.}. An Empirical Study of Textual Key-Fingerprint Representations. ({n. d.}).  Sergej Dechand Dominik Sch\u00fcrmann TU IBR Karoline Busse Yasemin Acar Sascha Fahl and Matthew Smith. {n. d.}. An Empirical Study of Textual Key-Fingerprint Representations. ({n. d.})."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/633292.633455"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.4.12"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.20"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025733"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSLP.1996.607046"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572547"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2009.07.008"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1785594.1785636"},{"key":"e_1_3_2_1_30_1","series-title":"December 2012","volume-title":"White Paper","author":"Moscaritolo Vinnie","year":"2012","unstructured":"Vinnie Moscaritolo , Gary Belvin , and Phil Zimmermann . 2012. Silent circle instant messaging protocol specification. Online , White Paper ( December 2012 ) ( 2012 ). Vinnie Moscaritolo, Gary Belvin, and Phil Zimmermann. 2012. Silent circle instant messaging protocol specification. Online, White Paper (December 2012) (2012)."},{"key":"e_1_3_2_1_31_1","volume-title":"International Workshop on Cryptographic Techniques and E-Commerce. 131--138","author":"Perrig Adrian","year":"1999","unstructured":"Adrian Perrig and Dawn Song . 1999 . Hash visualization: A new technique to improve real-world security . In International Workshop on Cryptographic Techniques and E-Commerce. 131--138 . Adrian Perrig and Dawn Song. 1999. Hash visualization: A new technique to improve real-world security. In International Workshop on Cryptographic Techniques and E-Commerce. 131--138."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660274"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818007"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Ersin Uzun Kristiina Karvonen and Nadarajah Asokan. 2007. Usability analysis of secure pairing methods. In Financial Cryptography & Data Security.  Ersin Uzun Kristiina Karvonen and Nadarajah Asokan. 2007. Usability analysis of secure pairing methods. In Financial Cryptography & Data Security.","DOI":"10.1007\/978-3-540-77366-5_29"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_19"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533069"}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","acronym":"ACSAC 2017","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134610","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134610","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134610"}},"subtitle":["A Study of Remote Key-Fingerprint Verification"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":36,"alternative-id":["10.1145\/3134600.3134610","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134610","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}