Three lessons from threema: Analysis of a secure messenger

KG Paterson, M Scarlata, KT Truong - 32nd USENIX Security Symposium …, 2023 - usenix.org
We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted
messaging application with more than 10 million users and 7000 corporate customers. We …

Collective Information Security in {Large-Scale} Urban Protests: the Case of Hong Kong

MR Albrecht, J Blasco, RB Jensen… - 30th USENIX security …, 2021 - usenix.org
The Anti-Extradition Law Amendment Bill protests in Hong Kong present a rich context for
exploring information security practices among protesters due to their large-scale urban …

Defensive technology use by political activists during the Sudanese revolution

A Daffalla, L Simko, T Kohno… - 2021 IEEE symposium …, 2021 - ieeexplore.ieee.org
Political activism is a worldwide force in geopolitical change and has, historically, helped
lead to greater justice, equality, and stopping human rights abuses. A modern revolution …

Key agreement for decentralized secure group messaging with strong security guarantees

M Weidner, M Kleppmann, D Hugenroth… - Proceedings of the …, 2021 - dl.acm.org
Secure group messaging protocols, providing end-to-end encryption for group
communication, need to handle mobile devices frequently being offline, group members …

[HTML][HTML] An offline mobile access control system based on self-sovereign identity standards

A Enge, A Satybaldy, M Nowostawski - Computer Networks, 2022 - Elsevier
Self-sovereign identity (SSI) is a new paradigm to digital identity management that is built on
decentralized technologies and can exist without centralized third-parties for managing the …

Asmesh: Anonymous and secure messaging in mesh networks using stronger, anonymous double ratchet

A Bienstock, P Rösler, Y Tang - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
The majority of secure messengers have single, centralized service providers that relay
ciphertexts between users to enable asynchronous communication. However, in some …

[HTML][HTML] Towards the advancement of cashless transaction: A security analysis of electronic payment systems

IT Moon, M Shamsuzzaman, MMR Mridha… - Journal of Computer and …, 2022 - scirp.org
In recent decades, day-to-day lifestyle requires online payments as easy and simple
solutions to several financial transactions, which makes the concept of Electronic payment …

(In) Security of Mobile Apps in Developing Countries: A Systematic Literature Review

A Diallo, J Samhi, T Bissyandé, J Klein - arXiv preprint arXiv:2405.05117, 2024 - arxiv.org
In developing countries, several key sectors, including education, finance, agriculture, and
healthcare, mainly deliver their services via mobile app technology on handheld devices. As …

Othered, silenced and scapegoated: Understanding the situated security of marginalised populations in lebanon

J McClearn, RB Jensen, R Talhouk - 32nd USENIX Security Symposium …, 2023 - usenix.org
In this paper we explore the digital security experiences of marginalised populations in
Lebanon such as LGBTQI+ identifying people, refugees and women. We situate our work in …

Breaking Bridgefy, again: Adopting libsignal is not enough

MR Albrecht, R Eikenberg, KG Paterson - 31st USENIX Security …, 2022 - usenix.org
Bridgefy is a messaging application that uses Bluetooth-based mesh networking. Its
developers and others have advertised it for use in areas witnessing large-scale protests …