Fast Packet Inspection for End-To-End Encryption
With the recent development and popularization of various network technologies, communicating with people at any time, and from any location, using high-speed internet, has become easily accessible. At the same time, eavesdropping, data interception, personal data leakage, and distribution of malwar...
Main Authors: | So-Yeon Kim, Sun-Woo Yun, Eun-Young Lee, So-Hyeon Bae, Il-Gu Lee |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-11-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/9/11/1937 |
Similar Items
-
Going dark? Analysing the impact of end-to-end encryption on the outcome of Dutch criminal court cases
by: Pieter Hartel, et al.
Published: (2023-03-01) -
On cryptographic security of end-to-end encrypted connections in WhatsApp and Telegram messengers
by: Sergey V. Zapechnikov, et al.
Published: (2017-11-01) -
End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption
by: Shi Lin, et al.
Published: (2024-01-01) -
Estimating End-to-End Available Bandwidth With Noises
by: Rongping Lin, et al.
Published: (2017-01-01) -
End-to-End Post-Quantum Cryptography Encryption Protocol for Video Conferencing System Based on Government Public Key Infrastructure
by: Yeongjae Park, et al.
Published: (2023-07-01)