共 50 条
- [41] SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023, 2023, : 187 - 201
- [42] End-to-End Encryption for GSM Cellular Standard Using CL-PKC INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 270 - 278
- [43] SQAMPS: Secure Quorum Architecture for Mobile Presence Services with End-to-End Encryption PROCEEDING OF THE THIRD INTERNATIONAL SYMPOSIUM ON WOMEN IN COMPUTING AND INFORMATICS (WCI-2015), 2015, : 608 - 613
- [44] EEE-GSM: End-to-End Encryption Scheme over GSM System INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06): : 229 - 239
- [45] Secret Key Recovery in a Global-Scale End-to-End Encryption System PROCEEDINGS OF THE 18TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2024, 2024, : 703 - 719
- [46] Improving Non-Experts' Understanding of End-to-End Encryption: An Exploratory Study 2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, : 210 - 219
- [48] Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 447 - 464
- [49] JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1519 - 1536
- [50] Jettisoning Junk Messaging in the Era of End-to-End Encryption: A Case Study of WhatsApp PROCEEDINGS OF THE ACM WEB CONFERENCE 2022 (WWW'22), 2022, : 2582 - 2591