End-to-End Secure Mobile Group Messaging with Conversation Integrity and Minimal Metadata Leakage.
Michael SchliepNicholas HopperPublished in: CCS (2018)
Keyphrases
- end to end
- metadata
- ad hoc networks
- digital libraries
- key management
- congestion control
- multipath
- admission control
- wireless ad hoc networks
- multi hop
- learning objects
- mobile devices
- wifi
- trusted computing
- context aware
- mobile phone
- multimedia
- location aware
- computing environments
- mobile users
- application layer
- high bandwidth
- integrity verification
- content delivery
- video sequences
- mobile networks
- rate distortion
- e learning
- real world
- real time