Search Results

1 - 8 of 8 items :

  • "secure messaging" x
Clear All
Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging

Waters. Efficient Ring Signatures without Random Oracles. In Public Key Cryptography , pages 166–180. Springer, 2007. [91] Gene Tsudik. Message Authentication with One-Way Hash Functions. ACM SIGCOMM Computer Communication Review , 22(5):29–38, 1992. [92] Nik Unger. Deniable Key Exchanges for Secure Messaging . PhD thesis, University of Waterloo, 2015. [93] Nik Unger and Ian Goldberg. Deniable Key Exchanges for Secure Messaging. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security , pages 1211–1223. ACM, 2015

Open access
Circumventing Cryptographic Deniability with Remote Attestation

,” Tech. Rep., 2016. [5] (2018) Briar: Secure messaging, anywhere. Accessed 2018-04-29. [Online]. Available: https://briarproject.org/ [6] (2018) Messenger. Accessed 2018-05-03. [Online]. Available: https://www.messenger.com/ [7] (2018) OTR version 4. Draft, accessed 2018-05-03. [Online]. Available: https://github.com/otrv4/otrv4/blob/master/otrv4.md [8] “Signal Protocol C library,” Code, 2018, commit 9e10362fce9072b104e6d5a51d6f56d939d1f36e. [Online]. Available: https://github.com/signalapp/libsignal-protocol-c [9] N. Asokan, G. Tsudik

Open access
Consistent Synchronous Group Off-The-Record Messaging with SYM-GOTR

Privacy in the Electronic Society, WPES ’17, (New York, NY, USA), pp. 31-40, ACM, 2017. [7] N. Unger, S. Dechand, J. Bonneau, S. Fahl, H. Perl, I. Goldberg, and M. Smith, “Sok: Secure messaging,” in Security and Privacy (SP), 2015 IEEE Symposium on, pp. 232-249, IEEE, 2015. [8] M. Burmester and Y. Desmedt, “A secure and efficient conference ey distribution system,” in Advances in cryptology EUROCRYPT’94, pp. 275-286, Springer, 1994. [9] M. Marlinspike and T. Perrin, “The x3dh key agreement protocol,” 2016

Open access
Wiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on ZRTP

. [7] Sergej Dechand, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha Fahl, and Matthew Smith. An Empirical Study of Textual Key-Fingerprint Representations. In 25th USENIX Security Symposium (USENIX Security 16) , pages 193–208, Austin, TX, August 2016. USENIX. [8] Werner Dittmann. ZRTP4PJ README. https://github.com/wernerd/ZRTP4PJ/tree/develop , 2015. (Accessed: 10/2016). [9] Electronic Frontier Foundation. Secure Messaging Scorecard. https://www.eff.org/secure-messaging-scorecard , November 2014. [10] Facebook. Messenger Secret

Open access
An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection

Domain. – In: Recent Advances in Engineering and Computational Sciences (RAECS’14), Chandigarh, 2014. 11. Bai, J., C.-C. Chang, T.-S. Nguyen, C. Zhu, Y. Liu. A High Payload Steganographic Algorithm Based on Edge Detection. – Displays, Vol. 46 , 2017, No 1, pp. 42-51. 12. Islam, S., M. R. Modi, P. Gupta. Edge-Based Image Steganography. – EURASIP Journal on Information Security, Vol. 2014 , 2014, No 1. 13. Irawan, C., D. R. I. M. Setiadi, C. A. Sari, E. H. Rachmawanto. Hiding and Securing Message on Edge Areas of Image Using LSB Steganography and OTP

Open access
A branch hash function as a method of message synchronization in anonymous P2P conversations

, Springer, Berlin/Heidelberg, pp. 122-139. Schoder, D. and Fischbach, K. (2003). Peer-to-peer prospects, Communications of the ACM 46(2): 27-29. Schollmeier, R. (2001). A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications, Proceedings of the 1st International Conference on Peer-to-Peer Computing, P2P’01, Link¨oping, Sweden, pp. 101-102. SDCDev (2014). Shadowcoin secure messaging: A P2P encrypted instant messaging system, www.shadowcoin.co. Serjantov, A

Open access
On Smart Contracts and Organisational Performance: A Review of Smart Contracts through the Blockchain Technology

., Gencer, A. E., Sirer, E. G., & Van Renesse, R. (2016). Bitcoin-NG: A Scalable Blockchain Protocol. In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI'16) (pp. 45-59). Santa Clara, CA: USENIX Association. 17. Eyal, L., & Sirer, E. G. (2014). Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security: 18th International Conference (pp. 436-454). Berlin Heiidelberg: Springer. 18. Farhana, T., Bappy, I. I., Prince, S. C., & Yasmeen, D. (2016). Secured

Open access
Individual versus Organizational Computer Security and Privacy Concerns in Journalism

-generation onion router,” in Proceedings of the 13th USENIX Security Symposium, 2004. [25] N. Unger, S. Dechand, J. Bonneau, S. Fahl, H. Perl, I. Goldberg, and M. Smith, “SoK: Secure Messaging,” in Proceedings of the IEEE Symposium on Security and Privacy, 2015. [26] M. Brennan, K. Metzroth, and R. Stafford, “Building Effective Internet Freedom Tools: Needfinding with the Tibetan Exile Community,” in 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014. [27] Internews Center for Innovation & Learning

Open access