SoK: Web Authentication in the Age of End-to-End Encryption.
Jenny BlessingDaniel HugenrothRoss J. AndersonAlastair R. BeresfordPublished in: CoRR (2024)
Keyphrases
- end to end
- web pages
- website
- congestion control
- admission control
- wireless ad hoc networks
- multipath
- data encryption
- integrity verification
- encryption decryption
- application layer
- content delivery
- security analysis
- ad hoc networks
- scalable video
- high bandwidth
- image authentication
- rate adaptation
- rate allocation
- real time