Security Analysis of End-to-End Encryption for Zoom Meetings.
Takanori IsobeRyoma ItoPublished in: ACISP (2021)
Keyphrases
- end to end
- security analysis
- encryption scheme
- encryption algorithm
- image encryption
- key exchange
- security properties
- high security
- mutual authentication
- elliptic curve cryptography
- public key
- smart card
- authentication protocol
- private key
- security requirements
- multipath
- ad hoc networks
- digital signature
- user authentication
- wireless ad hoc networks
- congestion control
- real time
- authentication scheme
- secret key
- data sharing
- information systems