SoK: secure messaging

N Unger, S Dechand, J Bonneau, S Fahl… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Motivated by recent revelations of widespread state surveillance of personal communication,
many solutions now claim to offer secure and private messaging. This includes both a large …

Ricci curvature of the internet topology

CC Ni, YY Lin, J Gao, XD Gu… - 2015 IEEE conference on …, 2015 - ieeexplore.ieee.org
Analysis of Internet topologies has shown that the Internet topology has negative curvature,
measured by Gromov's “thin triangle condition”, which is tightly related to core congestion …

Beyond the hype: On using blockchains in trust management for authentication

N Alexopoulos, J Daubert… - 2017 IEEE Trustcom …, 2017 - ieeexplore.ieee.org
Trust Management (TM) systems for authentication are vital to the security of online
interactions, which are ubiquitous in our everyday lives. Various systems, like the Web PKI …

27 years and 81 million opportunities later: Investigating the use of Email encryption for an entire university

C Stransky, O Wiese, V Roth, Y Acar… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Email is one of the main communication tools and has seen significant adoption in the past
decades. However, emails are sent in plain text by default and allow attackers easy access …

Deniable key exchanges for secure messaging

N Unger, I Goldberg - Proceedings of the 22nd acm sigsac conference …, 2015 - dl.acm.org
In the wake of recent revelations of mass government surveillance, secure messaging
protocols have come under renewed scrutiny. A widespread weakness of existing solutions …

A censorship-resistant, privacy-enhancing and fully decentralized name system

M Wachs, M Schanzenbach, C Grothoff - Cryptology and Network Security …, 2014 - Springer
Abstract The Domain Name System (DNS) is vital for access to information on the Internet.
This makes it a target for attackers whose aim is to suppress free access to information. This …

Sounds Good? Fast and Secure Contact Exchange in Groups

F Putz, S Haesler, M Hollick - Proceedings of the ACM on Human …, 2024 - dl.acm.org
Trustworthy digital communication requires the secure exchange of contact information, but
current approaches lack usability and scalability for larger groups of users. We evaluate the …

Current trends in blockchain implementations on the paradigm of public key infrastructure: a survey

D Maldonado-Ruiz, J Torres, N El Madhoun… - IEEE …, 2022 - ieeexplore.ieee.org
Since the emergence of the Bitcoin cryptocurrency, the blockchain technology has become
the new Internet tool with which researchers claim to be able to solve any existing online …

[HTML][HTML] How to decentralize the internet: A focus on data consolidation and user privacy

J Song, H Jung, S Chun, H Lee, M Kang, M Park… - Computer Networks, 2023 - Elsevier
Over the years, the Internet has become a field in which a small number of large Internet
companies dominate most of the Internet services. As users get used to using their services …

On the (in) security of ElGamal in OpenPGP

L De Feo, B Poettering, A Sorniotti - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Roughly four decades ago, Taher ElGamal put forward what is today one of the most widely
known and best understood public key encryption schemes. ElGamal encryption has been …