SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems.
Mashari AlatawiNitesh SaxenaPublished in: WISEC (2023)
Keyphrases
- end to end
- ad hoc networks
- key management
- data encryption
- wireless ad hoc networks
- integrity verification
- authentication scheme
- digital signature
- security requirements
- security analysis
- admission control
- scalable video
- congestion control
- key distribution
- security mechanisms
- elliptic curve cryptography
- image quality