|
|
|
Elham Al Qahtani, Yousra Javed, Sarah Tabassum, Lipsarani Sahoo and Mohamed Shehab
User adoption and usage of end-to-end encryption tools is an ongoing research topic. A subset of such tools allows users to encrypt confidential emails, as well as manage their access control using features such as the expiration time, disabling forwardi...
ver más
|
|
|