Articles with "end encryption" as a keyword



Photo from wikipedia

Security Analysis of End-to-End Encryption for Zoom Meetings

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3091722

Abstract: In the wake of the global COVID-19 pandemic, video conference systems have become essential for not only business purposes, but also private, academic, and educational uses. Among the various systems, Zoom is the most widely… read more here.

Keywords: end end; end; meeting participants; end encryption ... See more keywords
Photo from wikipedia

Getting Meta: A Multimodal Approach for Detecting Unsafe Conversations within Instagram Direct Messages of Youth

Sign Up to like & get
recommendations!
Published in 2023 at "Proceedings of the ACM on Human-Computer Interaction"

DOI: 10.1145/3579608

Abstract: Instagram, one of the most popular social media platforms among youth, has recently come under scrutiny for potentially being harmful to the safety and well-being of our younger generations. Automated approaches for risk detection may… read more here.

Keywords: end end; risk detection; risk; end ... See more keywords