Secure Opportunistic Multipath Key Exchange

ACM Conference on Computer and Communications Security, pp. 2077-2094, 2018.

Cited by: 1|Bibtex|Views13|Links
EI

Abstract:

The security of today's widely used communication security protocols is based on trust in Certificate Authorities (CAs). However, the real security of this approach is debatable, since certificate handling is tedious and many recent attacks have undermined the trust in CAs. On the other hand, opportunistic encryption protocols such as Tcp...More

Code:

Data:

Your rating :
0

 

Tags
Comments