|
 |
 |
Welcome to Usable Security Education Project Home Page |
|
Publications
- Introduction to Cryptography with Coding Theory,
2nd edition,
Wade Trappe and Lawrence C. Washington, Prentice Hall, 2005.
-
Network Security: Private Communication in a Public World,
2nd Edition, by Charlie Kaufman, Radia Perlman and Mike Speciner,
Prentice Hall, 2002.
- Selecting the Advanced
Encryption Standard, WILLIAM E. BURR, National Institute of Standards and Technology.
-
Cryptographic Techniques For Computers, Dennie Van Tassel, San Jose State College, San Jose, California
- Federal Information
Processing Standards Publication 197, November 26, 2001
- FaultBased
Attack of RSA Authentication, Andrea Pellegrini, Valeria Bertacco, Todd Austin, University of Michigan.
- An Elliptic Curve Cryptography based Authentication and
Key Agreement Protocol for Wireless Communication, M. Aydos, B. Sunar, and C . K. Koc
Electrical & Computer Engineering
Oregon State University.
-
Browser validation and extended validation SSL certiicates: an empirical
study, Robert Biddle, Tara Whalen, Andrew S. Patrick, Jennifer Sobey,
P.C. van Oorschot, ACM cloud computing workshop, Chicago, USA, 2009.
-
Making the impossible easy: Usable PKI, D. Balfanz, G. Durfee, and D. K. Smetters, Cranor and Garfinkel (eds), Security and Usability, 2005.
-
Crying wolf: an empirical study of SSL warning effectiveness, J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. Cranor, USENIX security, 2009.
- Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition, B. Schneier, Wiley, 1996.
Links
- Intel AES New Instruction Set.
- BlackBerry PGP Support Package
- Advanced Crypto Software Collection
- Enhancing COPACOBANA
Top
|
|
This material is based upon work supported by the National Science Foundation under Grant No. 0736643. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
|