1. Lecture Notes in Computer Science;M Backes,2010
2. Bae, S., et al.: Watching the watchers: practical video identification attack in LTE networks. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 1307–1324. USENIX Association, Boston, MA (2022)
3. Cisco.: Zero-trust security for webex (2021). https://www.cisco.com/c/en/us/solutions/collateral/collaboration/white-paper-c11-744553.pdf. Accessed 19 Oct 2022
4. Corretgé, S.I., Ivov, E.: End-to-end encryption in jitsi meet (2021). https://jitsi.org/wp-content/uploads/2021/08/jitsi-e2ee-1.0.pdf. Accessed 19 Oct 2022
5. Daemen, J., Rijmen, V.: Reijndael: the advanced encryption standard. Dr. Dobb’s J. Softw. Tools Prof. Program. 26(3), 137–139 (2001)