Hiding from Whom?Threat Models and In-The-Making Encryption Technologies[1]

  • Ksenia Ermoshina and
  • Francesca Musiani

…more information

  • Ksenia Ermoshina
    ISCC (CNRS/Sorbonne Université)

  • Francesca Musiani
    ISCC (CNRS/Sorbonne Université)

Access to articles of this journal’s current issues is restricted to subscribers. You may consult the back issues to see all available open access content.

If you hold an individual subscriber account with this journal, log in to your account.

For more information, contact us at client@erudit.org.

The abstract will be displayed.

Cover of cacher, Number 32, Fall 2018, Intermédialités