End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness.
Yevgeniy DodisDaniel JostBalachandar KesavanAntonio MarcedonePublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- end to end
- encryption decryption
- encryption scheme
- admission control
- access control
- information security
- encryption algorithm
- congestion control
- ad hoc networks
- intrusion detection
- high bandwidth
- service delivery
- network security
- content delivery
- wireless ad hoc networks
- multipath
- multi hop
- security policies
- internet protocol
- transport layer
- application layer