Login / Signup
Dynamic Security Analysis of Zoom, Google Meet and Microsoft Teams.
Nicholas Hunter Gauthier
Mohammad Iftekhar Husain
Published in:
SVCC (2020)
Keyphrases
</>
security analysis
security requirements
high security
smart card
public key
image encryption
encryption scheme
authentication protocol
high dimensional
business intelligence
fine grained
security properties