共 50 条
- [1] Breaking Message Integrity of an End-to-End Encryption Scheme of LINE COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 249 - 268
- [2] Security Analysis of End-to-End Encryption for Zoom Meetings INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 234 - 253
- [3] Security Analysis of End-to-End Encryption for Zoom Meetings IEEE ACCESS, 2021, 9 : 90677 - 90689
- [4] The Many Faces of End-to-End Encryption and Their Security Analysis 2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259
- [5] KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION AND A FORMAL VERIFICATION OF ITS SECURITY. Systems, computers, controls, 1982, 13 (03): : 59 - 69
- [7] EEE-GSM: End-to-End Encryption Scheme over GSM System INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06): : 229 - 239