watermark logo

下一个

自动播放

The Undeniable Truth

4 意见 • 06/16/24
分享
嵌入
paccione .co.uk
3

We show how to design protocols that resist attackers with remote attestation, including both completely cryptographic methods such as on-line deniable key establishment (that work against some adversaries and as adopted by the upcoming OTRv4) and methods that use TEEs (which can stop it completely).

By Lachlan Gunn, Ricardo Vieitez Parra & N Asokan

Full Abstract & Presentation Materials: https://www.blackhat.com/eu-18..../briefings/schedule/

显示更多
0 注释 sort 排序方式
脸书评论

下一个

自动播放