2003
DOI: 10.1145/950191.950195
|View full text |Cite
|
Sign up to set email alerts
|

Public-key support for group collaboration

Abstract: This paper characterizes the security of group collaboration as being a product not merely of cryptographic algorithms and coding practices, but also of the man-machine process of group creation. We show that traditional security mechanisms do not properly address the needs of a secured collaboration and present a research prototype, called NGC (next generation collaboration), that was designed to meet those needs. NGC distinguishes itself in the care with which the man-machine process was analyzed and shaped … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(19 citation statements)
references
References 4 publications
0
19
0
Order By: Relevance
“…In our paper, we consider the same problem but in a more demanding setting, as we assume that the users share no secret key prior to the key exchange. Dohrmann and Ellison [27] propose a method for key verification that is similar to our approach; this method is based on converting key hashes to readable words or to an appropriate graphical representation. However, it seems that users are required to compare a substantial number of words (or graphical objects); this task could take them as much as 24 s, according to [27].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In our paper, we consider the same problem but in a more demanding setting, as we assume that the users share no secret key prior to the key exchange. Dohrmann and Ellison [27] propose a method for key verification that is similar to our approach; this method is based on converting key hashes to readable words or to an appropriate graphical representation. However, it seems that users are required to compare a substantial number of words (or graphical objects); this task could take them as much as 24 s, according to [27].…”
Section: Related Workmentioning
confidence: 99%
“…Dohrmann and Ellison [27] propose a method for key verification that is similar to our approach; this method is based on converting key hashes to readable words or to an appropriate graphical representation. However, it seems that users are required to compare a substantial number of words (or graphical objects); this task could take them as much as 24 s, according to [27]. This time is significantly reduced when the graphical representation is used.…”
Section: Related Workmentioning
confidence: 99%
“… Listen-Listen: As three-word sentence is vocalized on both devices and user tries to configure their resemblance, if they appear to be similar the final response is added in two connecting devices separately. Two Speakers are required on both devices [24].…”
Section: ) Matchingmentioning
confidence: 99%
“…The concept of a ceremony was developed earlier than 2007 [8]. In the years since 2007, there has been an increasing trend to meld information security with the social sciences, as indicated by conferences both in the U.S.A 1 and in Europe 2 .…”
Section: Related Workmentioning
confidence: 99%