<--- Back to Details
First PageDocument Content
Key management / Internet privacy / Man-in-the-middle attack / Secure messaging / Public key infrastructure / ZRTP / Secure communication / S/MIME / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography
Date: 2015-04-03 17:54:45
Key management
Internet privacy
Man-in-the-middle attack
Secure messaging
Public key infrastructure
ZRTP
Secure communication
S/MIME
Digital signature
Cryptography
Cryptographic protocols
Public-key cryptography

SoK: Secure Messaging1 Nik Unger∗ , Sergej Dechand† Joseph Bonneau‡§ , Sascha Fahl¶ , Henning Perl¶ Ian Goldberg∗ , Matthew Smith† ∗

Add to Reading List

Source URL: www.jbonneau.com

Download Document from Source Website

File Size: 814,26 KB

Share Document on Facebook

Similar Documents

Securing Legacy Mobile Medical Devices Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher Computer Science Department University of California, Los Angeles {vahab,majid,reiher}@cs.ucla.edu

Securing Legacy Mobile Medical Devices Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher Computer Science Department University of California, Los Angeles {vahab,majid,reiher}@cs.ucla.edu

DocID: 1req6 - View Document

GlobecomCommunication and Information System Security Symposium  Probabilistic Key Distribution in Vehicular Networks with Infrastructure Support Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and

GlobecomCommunication and Information System Security Symposium Probabilistic Key Distribution in Vehicular Networks with Infrastructure Support Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and

DocID: 1qYip - View Document

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

DocID: 1qW6S - View Document

Stealing The Internet  An Internet-Scale  Man In The Middle Attack   Defcon 16, Las Vegas, NV - August 10th, 2008

Stealing The Internet An Internet-Scale Man In The Middle Attack Defcon 16, Las Vegas, NV - August 10th, 2008

DocID: 1qn2z - View Document

Improving the Usability of Web Browser Security Haidong Xia and Jose´ Carlos Brustoloni Department of Computer Science, University of Pittsburgh {hdxia,jcb}@cs.pitt.edu  ABSTRACT

Improving the Usability of Web Browser Security Haidong Xia and Jose´ Carlos Brustoloni Department of Computer Science, University of Pittsburgh {hdxia,jcb}@cs.pitt.edu ABSTRACT

DocID: 1qd1R - View Document