Social Authentication for End-to-End Encryption.
Elham VaziripourMark O'NeillJustin WuScott HeidbrinkKent E. SeamonsDaniel ZappalaPublished in: WAY@SOUPS (2016)
Keyphrases
- end to end
- encryption decryption
- data encryption
- identity authentication
- public key cryptography
- congestion control
- integrity verification
- image authentication
- admission control
- security analysis
- ad hoc networks
- multipath
- content delivery
- wireless ad hoc networks
- virtual private network
- public key
- scalable video
- transport layer
- application layer
- response time
- internet protocol
- authentication scheme
- encryption scheme