Login / Signup

Dynamic Security Analysis of Zoom, Google Meet and Microsoft Teams.

Nicholas Hunter GauthierMohammad Iftekhar Husain
Published in: SVCC (2020)
Keyphrases
  • security analysis
  • security requirements
  • high security
  • smart card
  • public key
  • image encryption
  • encryption scheme
  • authentication protocol
  • high dimensional
  • business intelligence
  • fine grained
  • security properties