What should crypto look like?

0Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Usability failures are the leading technical cause of phishing attacks and unintended plaintext emails, and share much of the blame for the problems with the Web's PKI. The security community should pay more attention to what cryptography should look like.

Cite

CITATION STYLE

APA

Bellovin, S. M. (2014, November 1). What should crypto look like? IEEE Security and Privacy. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/MSP.2014.131

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free