On security research towards future mobile network generations

D Rupprecht, A Dabrowski, T Holz… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …

End-to-end encrypted messaging protocols: An overview

K Ermoshina, F Musiani, H Halpin - Internet Science: Third International …, 2016 - Springer
This paper aims at giving an overview of the different core protocols used for decentralized
chat and email-oriented services. This work is part of a survey of 30 projects focused on …

A formal security analysis of the signal messaging protocol

K Cohn-Gordon, C Cremers, B Dowling, L Garratt… - Journal of …, 2020 - Springer
The Signal protocol is a cryptographic messaging protocol that provides end-to-end
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …

{CONIKS}: Bringing key transparency to end users

MS Melara, A Blankstein, J Bonneau… - 24th USENIX Security …, 2015 - usenix.org
We present CONIKS, an end-user key verification service capable of integration in end-to-
end encrypted communication systems. CONIKS builds on transparency log proposals for …

The moral character of cryptographic work

P Rogaway - Cryptology ePrint Archive, 2015 - eprint.iacr.org
Cryptography rearranges power: it configures who can do what, from what. This makes
cryptography an inherently\textit {political} tool, and it confers on the field an intrinsically\textit …

Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach

N Kobeissi, K Bhargavan… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
Many popular web applications incorporate end-toend secure messaging protocols, which
seek to ensure that messages sent between users are kept confidential and authenticated …

Obstacles to the adoption of secure communication tools

R Abu-Salma, MA Sasse, J Bonneau… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
The computer security community has advocated widespread adoption of secure
communication tools to counter mass surveillance. Several popular personal communication …

More is less: On the end-to-end security of group chats in signal, whatsapp, and threema

P Rösler, C Mainka, J Schwenk - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Secure instant messaging is utilized in two variants: one-to-one communication and group
communication. While the first variant has received much attention lately (Frosch et al …

Sok: Content moderation for end-to-end encryption

S Scheffler, J Mayer - arxiv preprint arxiv:2303.03979, 2023 - arxiv.org
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and
E2EE data storage is becoming common. These important advances for security and privacy …

A conflict-free replicated JSON datatype

M Kleppmann, AR Beresford - IEEE Transactions on Parallel …, 2017 - ieeexplore.ieee.org
Many applications model their data in a general-purpose storage format such as JSON. This
data structure is modified by the application as a result of user input. Such modifications are …