搜索结果: 1-15 共查到“军队指挥学 messaging”相关记录18条 . 查询时间(0.048 秒)
Traceback for End-to-End Encrypted Messaging
end-to-end encrypted messaging anonymity tracing abuse reporting
2019/8/30
Messaging systems are used to spread misinformation and other malicious content, often with dire consequences. End-to-end encryption improves privacy but hinders content-based moderation and, in parti...
Revisiting Post-Compromise Security Guarantees in Group Messaging
post-compromise security forward secrecy group messaging protocols
2019/5/13
Modern secure messaging protocols such as Signal can offer strong security guarantees, in particular Post-Compromise Security (PCS). The core PCS mechanism in these protocols is inherently pairwise, w...
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability
secure messaging mobile messaging
2018/11/16
In this paper, we describe Mobile CoWPI, a deployable, end-to-end secure mobile group messaging application with proofs of security. Mobile CoWPI allows dynamic groups of users to participate in, join...
Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging
Almost-Optimal Guarantees Secure Messaging
2018/11/6
In the era of mass surveillance and information breaches, privacy of Internet communication, and messaging in particular, is a growing concern. As secure messaging protocols are executed on the not-so...
Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging
Secure channel forward/backward security security models
2018/6/5
We aim to understand the best possible security of a (bidirectional) cryptographic channel against an adversary that may arbitrarily and repeatedly learn the secret state of either communicating party...
Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal
Computational Statistical Optimal
2018/5/28
Extensive efforts are currently put into securing messaging platforms, where a key challenge is that of protecting against man-in-the-middle attacks when setting up secure end-to-end channels. The vas...
Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet
cryptographic protocols messaging implementation position
2017/10/10
Secure messaging apps have enjoyed huge uptake, and with the headline figure of one billion active WhatsApp users there has been a corresponding burst of academic research on the topic. One might ther...
MCMix: Anonymous Messaging via Secure Multiparty Computation
anonymity messaging multiparty computation
2017/8/17
We present ‘MCMix’, an anonymous messaging system that completely hides communication metadata and can scale in the order of hundreds of thousands of users. Our approach is to isolate two suitable fun...
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
cryptographic protocols proof-of-concept implementation
2017/7/6
In the past few years secure messaging has become mainstream, with over a billion active users of end-to-end encryption protocols through apps such as WhatsApp, Signal, Facebook Messenger, Google Allo...
Honey Chatting: A novel instant messaging system robust to eavesdropping over communication
Honey Encryption Language model
2017/2/20
There have been many efforts to strengthen security of Instant Messaging (IM) system. One of the typical technologies is the conventional message encryption using a secret or private key. However, the...
Private communication over the Internet continues to be a challenging problem. Even if messages are encrypted, it is hard to deliver them without revealing metadata about which pairs of users are comm...
A Formal Security Analysis of the Signal Messaging Protocol
protocols messaging post-compromise security
2016/12/8
Signal is a new security protocol and accompanying app that provides end-to-end encryption for
instant messaging. The core protocol has recently been adopted by WhatsApp, Facebook Messenger, and
Goo...
Ratcheted Encryption and Key Exchange: The Security of Messaging
Symmetric encryption forward security backward security
2016/12/7
We give a theoretical treatment of ratcheting, lifting it from a technique used in secure messaging protocols to a cryptographic primitive. To allow a modular treatment, we decouple the creation of ke...
(In-)Secure messaging with the Silent Circle instant messaging protocol
SCimp Silent Circle instant messaging protocol
2016/7/20
Silent Text, the instant messaging application by the company Silent Circle, provides its users with end-to-end encrypted communication on the Blackphone and other smartphones. The underlying protocol...