SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems

Author:

Alatawi Mashari1ORCID,Saxena Nitesh1ORCID

Affiliation:

1. Texas A&M University, College Station, TX, USA

Publisher

ACM

Reference75 articles.

1. Ruba Abu-Salma , Kat Krol , Simon Parkin , Victoria Koh , Kevin Kwan , Jazib Mahboob , Zahra Traboulsi , and M Angela Sasse . 2017. The Security Blanket of the Chat World: An Analytic Evaluation and a User Study of Telegram . Internet Society . https://doi.org/10.14722/eurousec. 2017 .23006 10.14722/eurousec.2017.23006 Ruba Abu-Salma, Kat Krol, Simon Parkin, Victoria Koh, Kevin Kwan, Jazib Mahboob, Zahra Traboulsi, and M Angela Sasse. 2017. The Security Blanket of the Chat World: An Analytic Evaluation and a User Study of Telegram. Internet Society. https://doi.org/10.14722/eurousec.2017.23006

2. Obstacles to the Adoption of Secure Communication Tools

3. Dieter Bohn . 2020 . Google is rolling out end-to-end encryption for RCS in Android Messages beta . Retrieved July 11, 2022 from https://www.theverge.com/2020/11/ 19/21574451/android-rcs-encryption-message-end-to-end-beta Dieter Bohn. 2020. Google is rolling out end-to-end encryption for RCS in Android Messages beta. Retrieved July 11, 2022 from https://www.theverge.com/2020/11/ 19/21574451/android-rcs-encryption-message-end-to-end-beta

4. Off-the-record communication, or, why not to use PGP

5. Pew Research Center . 2017 . Most Americans think the government could be monitoring their phone calls and emails . Retrieved July 03, 2022 from https: //pewrsr.ch/3nI8hIf Pew Research Center. 2017. Most Americans think the government could be monitoring their phone calls and emails. Retrieved July 03, 2022 from https: //pewrsr.ch/3nI8hIf

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Design and implementation of a looking-forward Lawful Interception architecture for future mobile communication systems;Computer Networks;2024-07

2. Automating Key Fingerprint Comparisons in Secure Mobile Messaging Apps: A Case Study of Signal;Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy;2024-06-19

3. SEPPI: Secure and Privacy-Preserving Invitation for Unified Communication Meetings;2024 International Conference on Computing, Networking and Communications (ICNC);2024-02-19

4. Cryptographic Analysis: Popular Social Media Applications and Mitigations of Vulnerabilities;2023 26th International Conference on Computer and Information Technology (ICCIT);2023-12-13

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3