Experimental Analysis of Popular Smartphone Apps Offering Anonymity, Ephemerality, and End-to-End Encryption.
Lucky OnwuzurikeEmiliano De CristofaroPublished in: CoRR (2015)
Keyphrases
- end to end
- mobile applications
- security properties
- android platform
- data protection
- android application
- mobile devices
- user experience
- wireless ad hoc networks
- congestion control
- admission control
- multipath
- ad hoc networks
- real time
- digital signature
- encryption scheme
- privacy protection
- smart phones
- content delivery
- key management
- context aware
- mobile phone
- internet protocol
- high bandwidth
- transport layer
- peer to peer