Login / Signup
AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels.
Bradley Reaves
Logan Blue
Patrick Traynor
Published in:
USENIX Security Symposium (2016)
Keyphrases
</>
end to end
public key cryptography
smart card
congestion control
admission control
public key
wireless ad hoc networks
voice over internet protocol
hash functions
multipath
key management
ad hoc networks
service delivery
content delivery
security protocols
rate allocation
video conferencing