{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T18:40:07Z","timestamp":1746297607141,"version":"3.40.4"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,29]]},"DOI":"10.1145\/3600160.3600187","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T22:54:41Z","timestamp":1691621681000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Effect of Length on Key Fingerprint Verification Security and Usability"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-8338-558X","authenticated-orcid":false,"given":"Dan","family":"Turner","sequence":"first","affiliation":[{"name":"No academic affiliation, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5284-6847","authenticated-orcid":false,"given":"Siamak F","family":"Shahandashti","sequence":"additional","affiliation":[{"name":"University of York, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0100-9846","authenticated-orcid":false,"given":"Helen","family":"Petrie","sequence":"additional","affiliation":[{"name":"University of York, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"OpenSSH 8.2. 2020. OpenSSH Release Notes. www.openssh.com."},{"volume-title":"Basic English: Encode random bitstrings as pseudo-random poems. GitHub repository at https:\/\/github.com\/akwizgran\/basic-english.","year":"2014","key":"e_1_3_2_1_2_1","unstructured":"akwizgran. 2014. Basic English: Encode random bitstrings as pseudo-random poems. GitHub repository at https:\/\/github.com\/akwizgran\/basic-english."},{"key":"e_1_3_2_1_3_1","volume-title":"Workshop on the Theory and Application of of Cryptographic Techniques at EUROCRYPT \u201993","author":"Brands Stefan","year":"1993","unstructured":"Stefan Brands and David Chaum. 1993. Distance-bounding protocols. In Workshop on the Theory and Application of of Cryptographic Techniques at EUROCRYPT \u201993. Springer, 344\u2013359."},{"key":"e_1_3_2_1_4_1","unstructured":"Matthew Copeland Joergen Grahn and David\u00a0A Wheeler. 1999. The GNU Privacy Handbook. https:\/\/www.gnupg.org\/gph\/en\/manual.html."},{"key":"e_1_3_2_1_5_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Dechand Sergej","year":"2016","unstructured":"Sergej Dechand, Dominik Sch\u00fcrmann, Karoline Busse, Yasemin Acar, Sascha Fahl, and Matthew Smith. 2016. An empirical study of textual key-fingerprint representations. In 25th USENIX Security Symposium (USENIX Security 16). USENIX, Austin, TX, 193\u2013208."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500428"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.52"},{"key":"e_1_3_2_1_8_1","volume-title":"Do users verify SSH keys?Login 36","author":"Gutmann Peter","year":"2011","unstructured":"Peter Gutmann. 2011. Do users verify SSH keys?Login 36 (2011), 35\u201336."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3046055.3046059"},{"volume-title":"The Bubble Babble Binary Data Encoding","author":"Huima Antti","key":"e_1_3_2_1_10_1","unstructured":"Antti Huima. 2000. The Bubble Babble Binary Data Encoding. Network Working Group Internet Draft, available at http:\/\/web.mit.edu\/kenta\/www\/one\/bubblebabble\/spec\/jrtrjwzi\/draft-huima-01.txt."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572547"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572546"},{"key":"e_1_3_2_1_13_1","unstructured":"Raph Levien and Donald Johnson. 1998. Snowflake. http:\/\/dlakwi.net\/snowflake\/snowflake.html."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81111-2_17"},{"key":"e_1_3_2_1_15_1","unstructured":"Moxie Marlinspike. 2016. Safety number updates. Signal Blog. Availabe at https:\/\/signal.org\/blog\/safety-number-updates."},{"key":"e_1_3_2_1_16_1","volume-title":"International Workshop on Cryptographic Techniques and E-Commerce, Vol.\u00a025","author":"Perrig Adrian","year":"1999","unstructured":"Adrian Perrig and Dawn Song. 1999. Hash visualization: A new technique to improve real-world security. In International Workshop on Cryptographic Techniques and E-Commerce, Vol.\u00a025."},{"key":"e_1_3_2_1_17_1","volume-title":"Fuzzy Fingerprints Attacking Vulnerabilities in the Human Brain. Online publication,","author":"Rieck Konrad","year":"2002","unstructured":"Konrad Rieck. 2002. Fuzzy Fingerprints Attacking Vulnerabilities in the Human Brain. Online publication, available at http:\/\/ouah.org\/ffp.pdf (2002)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2016.23012"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134610"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025733"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979282"},{"key":"e_1_3_2_1_22_1","unstructured":"Elham Vaziripour Justin Wu Mark O\u2019Neill Daniel Metro Josh Cockrell Timothy Moffett Jordan Whitehead Nick Bonner Kent\u00a0E Seamons and Daniel Zappala. 2018. Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal.. In SOUPS@ USENIX Security Symposium. 47\u201362."},{"key":"e_1_3_2_1_23_1","volume-title":"13th Symposium on Usable Privacy and Security (SOUPS\u201917)","author":"Vaziripour Elham","year":"2017","unstructured":"Elham Vaziripour, Justin Wu, Mark O\u2019Neill, Jordan Whitehead, Scott Heidbrink, Kent Seamons, and Daniel Zappala. 2017. Is that you, Alice? A usability study of the authentication ceremony of secure messaging applications. In 13th Symposium on Usable Privacy and Security (SOUPS\u201917). 29\u201347."},{"key":"e_1_3_2_1_24_1","unstructured":"WhatsApp. 2017. WhatsApp Encryption Overview. Technical white paper WhatsApp Available from whatsapp.com."},{"key":"e_1_3_2_1_25_1","volume-title":"Signal. In 15th Symposium on Usable Privacy and Security (SOUPS\u201919)","author":"Wu Justin","year":"2019","unstructured":"Justin Wu, Cyrus Gattrell, Devon Howard, Jake Tyler, Elham Vaziripour, Kent Seamons, and Daniel Zappala. 2019. \u201cSomething isn\u2019t secure, but I\u2019m not sure how that translates into a problem\u201d: Promoting autonomy by designing for understanding in Signal. In 15th Symposium on Usable Privacy and Security (SOUPS\u201919)."}],"event":{"name":"ARES 2023: The 18th International Conference on Availability, Reliability and Security","acronym":"ARES 2023","location":"Benevento Italy"},"container-title":["Proceedings of the 18th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600160.3600187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T18:26:21Z","timestamp":1746296781000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3600187"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":25,"alternative-id":["10.1145\/3600160.3600187","10.1145\/3600160"],"URL":"https:\/\/doi.org\/10.1145\/3600160.3600187","relation":{},"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"2023-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}