2015 IEEE Symposium on Security and Privacy 2015
DOI: 10.1109/sp.2015.22
|View full text |Cite
|
Sign up to set email alerts
|

SoK: Secure Messaging

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
143
0
1

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 140 publications
(148 citation statements)
references
References 38 publications
0
143
0
1
Order By: Relevance
“…For a detailed review of the literature on secure communication tools, we refer the reader to Unger et al [1]. Secure communication tools became widely available with the release of PGP in 1991 [22], which was followed by the creation of a large ecosystem of PGP tools [13], [23], [24].…”
Section: A Secure Communicationsmentioning
confidence: 99%
See 3 more Smart Citations
“…For a detailed review of the literature on secure communication tools, we refer the reader to Unger et al [1]. Secure communication tools became widely available with the release of PGP in 1991 [22], which was followed by the creation of a large ecosystem of PGP tools [13], [23], [24].…”
Section: A Secure Communicationsmentioning
confidence: 99%
“…The main UI challenge for E2E-encrypted communication tools is believed to be providing assurance that a user is truly communicating with the intended party (called trust establishment by Unger et al [1]). This is often reduced to verifying ownership of cryptographic keys in some fashion.…”
Section: A Secure Communicationsmentioning
confidence: 99%
See 2 more Smart Citations
“…While these systems are for two-way communication, there are several similarities, such as dedicated servers for storing encrypted messages. Both Pond and Signal use the Signal protocol (previously known as Axolotl) [20]. The Signal protocol is inspired by the Off-the-Record (OTR) Messaging protocol [5] and provides among other things forward secrecy.…”
Section: Related Workmentioning
confidence: 99%