Login / Signup
The Man in the Middlebox: Violations of End-to-End Encryption.
Jasmine Peled
Bendert Zevenbergen
Nick Feamster
Published in:
login Usenix Mag. (2019)
Keyphrases
</>
end to end
ad hoc networks
congestion control
multipath
secret key
wireless ad hoc networks
real world
multi hop
key management
rate allocation
scalable video
real time
admission control