共 50 条
- [21] A Formal Security Analysis of the p ≡ p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2019, 2020, 11967 : 171 - 187
- [22] An End-to-End Security Approach for Digital Document Management COMPUTER JOURNAL, 2016, 59 (07): : 1076 - 1090
- [24] Type-preserving Compilation for End-to-end Verification of Security Enforcement PLDI '10: PROCEEDINGS OF THE 2010 ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION, 2010, : 412 - 423
- [25] EEE-GSM: End-to-End Encryption Scheme over GSM System INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06): : 229 - 239
- [26] Secret Key Recovery in a Global-Scale End-to-End Encryption System PROCEEDINGS OF THE 18TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2024, 2024, : 703 - 719
- [27] JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1519 - 1536