Login / Signup
A survey on the security protocols employed by mobile messaging applications.
Stefania Andries
Andrei-Daniel Miron
Andrei Cristian
Emil Simion
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
artificial immune algorithm
mobile devices
security properties
security services
key management
authentication protocol
security mechanisms
mobile phone
fault tolerant
cryptographic protocols
secure communication
data mining
security requirements