Secure Opportunistic Multipath Key Exchange
ACM Conference on Computer and Communications Security, pp. 2077-2094, 2018.
The security of today's widely used communication security protocols is based on trust in Certificate Authorities (CAs). However, the real security of this approach is debatable, since certificate handling is tedious and many recent attacks have undermined the trust in CAs. On the other hand, opportunistic encryption protocols such as Tcp...More
Full Text (Upload PDF)
PPT (Upload PPT)