DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Moxie Marlinspike
Moxie Marlinspike
The Double Ratchet Algorithm
Security Analysis of the Signal Protocol Student: Bc
SSL/TLS Interception Proxies and Transitive Trust Jeff Jarmoc Dell Secureworks Counter Threat Unit℠ Threat Intelligence
Is Bob Sending Mixed Signals?
The Most Dangerous Code in the World: Validating SSL Certificates In
The Bad-Attitude Guide to Computer Security
Multi-Device Secure Instant Messaging
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
Clone Detection in Secure Messaging: Improving Post-Compromise Security in Practice
More Tricks for Defeating SSL in Practice
On the End-To-End Security of Group Chats in Instant Messaging Protocols
HUNTING for VULNERABILITIES in SIGNAL JP Aumasson & Markus Vervier
A Security Analysis of the Signal Protocol's Group Messaging
The Humanitarian Metadata Problem: 'Doing No Harm' in the Digital
Lessons Learned from Previous SSL/TLS Attacks a Brief Chronology of Attacks and Weaknesses
Metadata Reduction for the Signal Protocol
US Subpoena Tests Privacy Promise of Encrypted Messaging App 4 October 2016, by Raphael Satter
Standardising by Running Code'': the Signal Protocol and De Facto
Top View
Web Service Security with TLS
Encrypted Messaging & Society Feat. Telegram and Signal
The Post-Quantum Signal Protocol Secure Chat in a Quantum World
A Performance Evaluation of Post-Quantum Cryptography in the Signal Protocol En Prestandautvärdering Av Kvantsäkert Krypto I Signal- Protokollet
How Secure Is Textsecure?
Network Security and Privacy
Weekly Wireless Report March 10, 2017
How Secure Are Secure Messengers? Our Experience Reviewing Popular Applications
Secure Messaging
Analysing the Signal Protocol a Manual and Automated Analysis of the Signal Protocol
On the End-To-End Security of Group Chats in Signal, Whatsapp, and Threema
Saudi Arabia
Ntrepid Academy Keeps You There
Hybrid Signal Protocol for Post-Quantum Email Encryption
A Formal Security Analysis of the Signal Messaging Protocol Extended Version, July 2019†
The Snowden Phone: a Comparative Survey of Secure Instant Messaging Mobile Applications
D3.6 -- Principles of Decentralized Internet Governance
Where Provable Security and Real-World Messaging Don't Quite
Adventures in TLS
Attacks to the Ssl Protocol Authors
Comparing Implementations of Secure Messaging Protocols (Long Version) Christian Johansen , Aulon Mujaj , Hamed Arshad , Josef Noll Research Report 475, November 2017
Protecting the Privacy of Your Video Conversations Understanding the Differences Between Zoom and Signal App
New Tricks for Defeating SSL in Practice