The Many Faces of End-to-End Encryption and Their Security Analysis.
Mohamed NabeelPublished in: EDGE (2017)
Keyphrases
- end to end
- security analysis
- encryption scheme
- key exchange
- image encryption
- security properties
- encryption algorithm
- high security
- mutual authentication
- public key
- elliptic curve cryptography
- smart card
- security requirements
- congestion control
- wireless ad hoc networks
- authentication protocol
- ad hoc networks
- private key
- digital signature
- user authentication
- authentication scheme
- information security