End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness.
Yevgeniy DodisDaniel JostBalachandar KesavanAntonio MarcedonePublished in: EUROCRYPT (5) (2023)
Keyphrases
- end to end
- encryption decryption
- encryption scheme
- wireless ad hoc networks
- encryption algorithm
- admission control
- ad hoc networks
- access control
- key management
- network security
- rate allocation
- congestion control
- transport layer
- security policies
- multi hop
- information security
- intrusion detection
- real time
- application layer
- coding scheme
- multipath