Insecure by Design: Protocols for Encrypted Phone Calls
暂无分享,去创建一个
[1] L. Winner. DO ARTIFACTS HAVE (cid:1) POLITICS? , 2022 .
[2] Jennifer Granick,et al. We Kill People Based on Metadata , 2017 .
[3] Christopher Parsons. The Governance of Telecommunications Surveillance: How Opaque and Unaccountable Practices and Policies Threaten Canadians , 2015 .
[4] Phillip Rogaway,et al. The Moral Character of Cryptographic Work , 2015, IACR Cryptol. ePrint Arch..
[5] Edgar R. Weippl,et al. IMSI-catch me if you can: IMSI-catcher-catchers , 2014, ACSAC.
[6] Nitesh Saxena,et al. Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones , 2014, CCS.
[7] Michael Groves,et al. MIKEY-SAKKE: Sakai-Kasahara Key Encryption in Multimedia Internet KEYing (MIKEY) , 2012, RFC.
[8] Ting Yu,et al. Proceedings of the 2007 ACM workshop on Privacy in electronic society , 2007, CCS 2007.
[9] Ian Goldberg,et al. Improved user authentication in off-the-record messaging , 2007, WPES '07.
[10] Diomidis Spinellis,et al. The Athens Affair , 2007, IEEE Spectrum.
[11] Michael Roe,et al. The GCHQ Protocol and Its Problems , 1997, EUROCRYPT.
[12] Matt Blaze,et al. Protocol failure in the escrowed encryption standard , 1994, CCS '94.