{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:34:55Z","timestamp":1740101695333,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","funder":[{"name":"SIDN fonds"},{"name":"NLnet"},{"name":"NWO"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544549.3585622","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T07:31:18Z","timestamp":1681975878000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["PostGuard: Towards Easy and Secure Email Communication"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-8466-0879","authenticated-orcid":false,"given":"Leon","family":"Botros","sequence":"first","affiliation":[{"name":"Radboud University, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6239-8673","authenticated-orcid":false,"given":"Merel","family":"Brandon","sequence":"additional","affiliation":[{"name":"Radboud University, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0740-0336","authenticated-orcid":false,"given":"Bart","family":"Jacobs","sequence":"additional","affiliation":[{"name":"Radboud University, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0665-5369","authenticated-orcid":false,"given":"Daniel","family":"Ostkamp","sequence":"additional","affiliation":[{"name":"Radboud University, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1847-2754","authenticated-orcid":false,"given":"Hanna","family":"Schraffenberger","sequence":"additional","affiliation":[{"name":"Radboud University, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4483-400X","authenticated-orcid":false,"given":"Marloes","family":"Venema","sequence":"additional","affiliation":[{"name":"Radboud University, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"volume-title":"FOCI @ USENIX Security Symposium","author":"Abu-Salma Ruba","key":"e_1_3_3_3_1_1","unstructured":"Ruba Abu-Salma, Elissa\u00a0M. Redmiles, Blase Ur, and Miranda Wei. 2018. Exploring User Mental Models of End-to-End Encrypted Communication Tools. In FOCI @ USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.65"},{"volume-title":"Lightweight Encryption for Email","author":"Adida Ben","key":"e_1_3_3_3_3_1","unstructured":"Ben Adida, Susan Hohenberger, and Ronald\u00a0L. Rivest. 2005. Lightweight Encryption for Email. In SRUTI. USENIX Association."},{"key":"e_1_3_3_3_4_1","volume-title":"Lank, and Ian Goldberg","author":"Atwater Erinn","year":"2015","unstructured":"Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ed Lank, and Ian Goldberg. 2015. Leading Johnny to Water: Designing for Usability and Trust. In SOUPS. USENIX Association, 69\u201388."},{"volume-title":"An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems","author":"Bai Wei","key":"e_1_3_3_3_5_1","unstructured":"Wei Bai, Moses Namara, Yichen Qian, Patrick\u00a0Gage Kelley, Michelle\u00a0L. Mazurek, and Doowon Kim. 2016. An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems. In SOUPS. USENIX Association, 113\u2013130."},{"volume-title":"EUROCRYPT(Lecture Notes in Computer Science, Vol.\u00a03027)","author":"Boneh Dan","key":"e_1_3_3_3_6_1","unstructured":"Dan Boneh and Xavier Boyen. 2004. Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In EUROCRYPT(Lecture Notes in Computer Science, Vol.\u00a03027). Springer, 223\u2013238."},{"volume-title":"CRYPTO(Lecture Notes in Computer Science, Vol.\u00a02139)","author":"Boneh Dan","key":"e_1_3_3_3_7_1","unstructured":"Dan Boneh and Matthew\u00a0K. Franklin. 2001. Identity-Based Encryption from the Weil Pairing. In CRYPTO(Lecture Notes in Computer Science, Vol.\u00a02139). Springer, 213\u2013229."},{"key":"e_1_3_3_3_8_1","first-page":"1","article-title":"Design Principles for Actual Security. In NordiCHI (Adjunct)","volume":"41","author":"Brandon Merel","year":"2022","unstructured":"Merel Brandon, Hanna\u00a0Kathrin Schraffenberger, Wouter Sluis-Thiescheffer, Thea van\u00a0der Geest, Daniel Ostkamp, and Bart Jacobs. 2022. Design Principles for Actual Security. In NordiCHI (Adjunct). ACM, 41:1\u201341:6.","journal-title":"ACM"},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"crossref","unstructured":"Sergej Dechand Alena Naiakshina Anastasia Danilova and Matthew Smith. 2019. In Encryption We Don\u2019t Trust: The Effect of End-to-End Encryption to the Masses on User Perception. In EuroS&P. IEEE 401\u2013415.","DOI":"10.1109\/EuroSP.2019.00037"},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_3_3_11_1","volume-title":"European Digital Identity. https:\/\/commission.europa.eu\/strategy-and-policy\/priorities-2019-2024\/europe-fit-digital-age\/european-digital-identity_en. Accessed","author":"European Commission","year":"2023","unstructured":"European Commission.. European Digital Identity. https:\/\/commission.europa.eu\/strategy-and-policy\/priorities-2019-2024\/europe-fit-digital-age\/european-digital-identity_en. Accessed: 6 March 2023."},{"key":"e_1_3_3_3_12_1","volume-title":"Annual Symposium on Information Assurance and Secure Knowledge Management (ASIA\u201912)","author":"Fry Ann","year":"2012","unstructured":"Ann Fry, Sonia Chiasson, and Anil Somayaji. 2012. Not sealed but delivered: The (un) usability of S\/MIME today. In Annual Symposium on Information Assurance and Secure Knowledge Management (ASIA\u201912), Albany, NY."},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253564"},{"volume-title":"SOUPS(ACM International Conference Proceeding Series, Vol.\u00a093)","author":"L.","key":"e_1_3_3_3_14_1","unstructured":"Simson\u00a0L. Garfinkel and Robert\u00a0C. Miller. 2005. Johnny 2: a user test of key continuity management with S\/MIME and Outlook Express. In SOUPS(ACM International Conference Proceeding Series, Vol.\u00a093). ACM, 13\u201324."},{"key":"e_1_3_3_3_15_1","volume-title":"AusCERT Asia Pacific Information Technology Security Conference.","author":"Gutmann Peter","year":"2004","unstructured":"Peter Gutmann. 2004. Why isn\u2019t the Internet secure yet, dammit. In AusCERT Asia Pacific Information Technology Security Conference."},{"key":"e_1_3_3_3_16_1","unstructured":"L. Ingham. 2018. 88cyberattacks. https:\/\/www.verdict.co.uk\/uk-data-breaches-human-error\/"},{"key":"e_1_3_3_3_17_1","volume-title":"Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists. In EuroS&P","author":"Lerner Ada","year":"2017","unstructured":"Ada Lerner, Eric Zeng, and Franziska Roesner. 2017. Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists. In EuroS&P. IEEE, 385\u2013400."},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.09.003"},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.11.003"},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685221311314419"},{"key":"e_1_3_3_3_21_1","unstructured":"Privacy by Design Foundation and SIDN. 2023. IRMA [Mobile application]. https:\/\/irma.app"},{"key":"e_1_3_3_3_22_1","unstructured":"Privacy by Design Foundation and SIDN. 2023. Yivi [Mobile application]. https:\/\/yivi.app"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2021.568284"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"crossref","unstructured":"Scott Ruoti Jeff Andersen Scott Heidbrink Mark O\u2019Neill Elham Vaziripour Justin Wu Daniel Zappala and Kent\u00a0E. Seamons. 2016. \"We\u2019re on the Same Page\": A Usability Study of Secure Email Using Pairs of Novice Users. In CHI. ACM 4298\u20134308.","DOI":"10.1145\/2858036.2858400"},{"key":"e_1_3_3_3_25_1","doi-asserted-by":"crossref","unstructured":"Scott Ruoti Jeff Andersen Travis Hendershot Daniel Zappala and Kent\u00a0E. Seamons. 2016. Private Webmail 2.0: Simple and Easy-to-Use Secure Email. In UIST. ACM 461\u2013472.","DOI":"10.1145\/2984511.2984580"},{"volume-title":"SOUPS @ USENIX Security Symposium","author":"Ruoti Scott","key":"e_1_3_3_3_26_1","unstructured":"Scott Ruoti, Jeff Andersen, Tyler Monson, Daniel Zappala, and Kent\u00a0E. Seamons. 2018. A Comparative Usability Study of Key Management in Secure Email. In SOUPS @ USENIX Security Symposium. USENIX Association, 375\u2013394."},{"key":"e_1_3_3_3_27_1","volume-title":"Why Johnny still, still can\u2019t encrypt: Evaluating the usability of a modern PGP client. arXiv preprint arXiv:1510.08555","author":"Ruoti Scott","year":"2015","unstructured":"Scott Ruoti, Jeff Andersen, Daniel Zappala, and Kent Seamons. 2015. Why Johnny still, still can\u2019t encrypt: Evaluating the usability of a modern PGP client. arXiv preprint arXiv:1510.08555 (2015)."},{"key":"e_1_3_3_3_28_1","first-page":"1","article-title":"Confused Johnny: when automatic encryption leads to confusion and mistakes","volume":"5","author":"Ruoti Scott","year":"2013","unstructured":"Scott Ruoti, Nathan Kim, Ben Burgon, Timothy\u00a0W. van\u00a0der Horst, and Kent\u00a0E. Seamons. 2013. Confused Johnny: when automatic encryption leads to confusion and mistakes. In SOUPS. ACM, 5:1\u20135:12.","journal-title":"SOUPS. ACM"},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2933683"},{"volume-title":"CRYPTO(Lecture Notes in Computer Science, Vol.\u00a0196)","author":"Shamir Adi","key":"e_1_3_3_3_30_1","unstructured":"Adi Shamir. 1984. Identity-Based Cryptosystems and Signature Schemes. In CRYPTO(Lecture Notes in Computer Science, Vol.\u00a0196). Springer, 47\u201353."},{"key":"e_1_3_3_3_31_1","unstructured":"Steve Sheng Levi Broderick Colleen\u00a0Alison Koranda and Jeremy\u00a0J Hyland. 2006. Why Johnny still can\u2019t encrypt: evaluating the usability of email encryption software. In SOUPS. ACM 3\u20134."},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833755"},{"volume-title":"ESORICS(Lecture Notes in Computer Science, Vol.\u00a06879)","author":"Ulrich Alexander","key":"e_1_3_3_3_33_1","unstructured":"Alexander Ulrich, Ralph Holz, Peter Hauck, and Georg Carle. 2011. Investigating the OpenPGP Web of Trust. In ESORICS(Lecture Notes in Computer Science, Vol.\u00a06879). Springer, 489\u2013507."},{"key":"e_1_3_3_3_34_1","volume-title":"USENIX Security Symposium. USENIX Association.","author":"Whitten Alma","year":"1999","unstructured":"Alma Whitten and J.\u00a0Doug Tygar. 1999. Why Johnny Can\u2019t Encrypt: A Usability Evaluation of PGP 5.0. In USENIX Security Symposium. USENIX Association."},{"volume-title":"SOUPS @ USENIX Security Symposium","author":"Wu Justin","key":"e_1_3_3_3_35_1","unstructured":"Justin Wu and Daniel Zappala. 2018. When is a Tree Really a Truck? Exploring Mental Models of Encryption. In SOUPS @ USENIX Security Symposium. USENIX Association, 395\u2013409."}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Hamburg Germany","acronym":"CHI '23"},"container-title":["Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544549.3585622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T18:33:03Z","timestamp":1710786783000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544549.3585622"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":35,"alternative-id":["10.1145\/3544549.3585622","10.1145\/3544549"],"URL":"https:\/\/doi.org\/10.1145\/3544549.3585622","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}