共 50 条
- [1] Security Analysis of End-to-End Encryption for Zoom Meetings [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 234 - 253
- [2] Security Analysis of End-to-End Encryption for Zoom Meetings [J]. IEEE ACCESS, 2021, 9 : 90677 - 90689
- [4] End-to-End Differentiable Proving [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 30 (NIPS 2017), 2017, 30
- [5] Traceback for End-to-End Encrypted Messaging [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 413 - 430
- [8] End-to-End Encrypted Messaging Protocols: An Overview [J]. INTERNET SCIENCE, (INSCI 2016), 2016, 9934 : 244 - 254
- [9] End-to-end Learning for Encrypted Image Retrieval [J]. 2021 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2021, : 1839 - 1845
- [10] End-to-end Flow Inference of Encrypted MANET [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 1104 - 1109