Proceedings of the 35th Annual Computer Security Applications Conference 2019
DOI: 10.1145/3359789.3359800
|View full text |Cite
|
Sign up to set email alerts
|

Will you trust this TLS certificate?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 28 publications
1
6
0
Order By: Relevance
“…All these codes were much less present in the redesigned documentation -supporting the decrease of perceived severity seen in the quantitative evaluation. As illustrated by the following quote, the content analysis also emphasizes that IT professionals want to see the precise details to pinpoint the error quickly (consistent with findings in the related work [31]). Inconsistency & Incorrectness.…”
Section: Rq1: Perceived Obstaclessupporting
confidence: 65%
See 3 more Smart Citations
“…All these codes were much less present in the redesigned documentation -supporting the decrease of perceived severity seen in the quantitative evaluation. As illustrated by the following quote, the content analysis also emphasizes that IT professionals want to see the precise details to pinpoint the error quickly (consistent with findings in the related work [31]). Inconsistency & Incorrectness.…”
Section: Rq1: Perceived Obstaclessupporting
confidence: 65%
“…A similar study on the effects of redesigned documentation was performed in 2019 by Ukrop et al [31]. 75 attendees of an industrial conference interacted with certificate validation error messages and documentation in either original or redesigned version, focusing on the perceived trust in differently flawed certificates.…”
Section: Attempting a Changementioning
confidence: 95%
See 2 more Smart Citations
“…All apps [64][65][66][67][68][69][70][71][72][73] can work in closed/controlled environments, except [64] which can work also in an open environment when using a digital signature or checking URLs. Users should be aware of the potential threats when using digital signature certificates such as expired certificates, self-signed certificates, hostname mismatch, and chain of certificates issues [74,75].…”
Section: Discussionmentioning
confidence: 99%