Login / Signup
SEEMless: Secure End-to-End Encrypted Messaging with less Trust.
Melissa Chase
Apoorvaa Deshpande
Esha Ghosh
Harjasleen Malvai
Published in:
CCS (2019)
Keyphrases
</>
end to end
encryption key
encryption scheme
trusted computing
admission control
fault tolerant
wireless ad hoc networks
content delivery
congestion control
high bandwidth
key management
multipath
real time
scalable video
internet protocol
text localization and recognition