| Virual Oral Presentation Slide by Slide |
IEEE/ICACT20220059 Slide.06
[Big Slide]
[YouTube] |
Oral Presentation |
|
|
Before looking at the ideas of the paper, let us look at the concepts used in the paper. First, end-to-end encryption applies encryption in all processes between sending and receiving nodes when delivering a message through an encryption key shared between targets to communicate. Therefore, third-party cannot decrypt and extract messages in the middle. This technology is used for communication programs like Apple's I-Massage and WhatsApp. | |
| [Go to Next Slide] |