IEEE/ICACT20220059 Slide.06        [Big Slide]       [YouTube] Oral Presentation
Before looking at the ideas of the paper, let us look at the concepts used in the paper. First, end-to-end encryption applies encryption in all processes between sending and receiving nodes when delivering a message through an encryption key shared between targets to communicate. Therefore, third-party cannot decrypt and extract messages in the middle. This technology is used for communication programs like Apple's I-Massage and WhatsApp.

[Go to Next Slide]
Select Voice: