Security Analysis of End-to-End Encryption for Zoom Meetings.
Takanori IsobeRyoma ItoPublished in: IEEE Access (2021)
Keyphrases
- end to end
- security analysis
- encryption scheme
- security properties
- image encryption
- key exchange
- encryption algorithm
- high security
- mutual authentication
- elliptic curve cryptography
- public key
- smart card
- security requirements
- ad hoc networks
- wireless ad hoc networks
- private key
- congestion control
- multipath
- digital signature
- authentication protocol
- public key cryptography
- ciphertext
- user authentication
- authentication scheme
- secret key
- real world
- key management
- data management
- sensor networks