Login / Signup
Can Johnny finally encrypt?: evaluating E2E-encryption in popular IM applications.
Amir Herzberg
Hemi Leibowitz
Published in:
STAST (2016)
Keyphrases
</>
encryption algorithm
secret key
encryption decryption
neural network
high security