Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System. Maleckas, R., Paterson, K. G., & Albrecht, M. R. IACR Cryptol. ePrint Arch., 2023. Paper bibtex @article{DBLP:journals/iacr/MaleckasPA23,
author = {Robertas Maleckas and
Kenneth G. Paterson and
Martin R. Albrecht},
title = {Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing
System},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {1118},
year = {2023},
url = {https://eprint.iacr.org/2023/1118},
timestamp = {Fri, 04 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/MaleckasPA23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"EnWffcndw7dqNsACu","bibbaseid":"maleckas-paterson-albrecht-practicallyexploitablevulnerabilitiesinthejitsivideoconferencingsystem-2023","author_short":["Maleckas, R.","Paterson, K. G.","Albrecht, M. R."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Robertas"],"propositions":[],"lastnames":["Maleckas"],"suffixes":[]},{"firstnames":["Kenneth","G."],"propositions":[],"lastnames":["Paterson"],"suffixes":[]},{"firstnames":["Martin","R."],"propositions":[],"lastnames":["Albrecht"],"suffixes":[]}],"title":"Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System","journal":"IACR Cryptol. ePrint Arch.","pages":"1118","year":"2023","url":"https://eprint.iacr.org/2023/1118","timestamp":"Fri, 04 Aug 2023 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/iacr/MaleckasPA23.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/iacr/MaleckasPA23,\n author = {Robertas Maleckas and\n Kenneth G. Paterson and\n Martin R. Albrecht},\n title = {Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing\n System},\n journal = {{IACR} Cryptol. ePrint Arch.},\n pages = {1118},\n year = {2023},\n url = {https://eprint.iacr.org/2023/1118},\n timestamp = {Fri, 04 Aug 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/iacr/MaleckasPA23.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Maleckas, R.","Paterson, K. G.","Albrecht, M. R."],"key":"DBLP:journals/iacr/MaleckasPA23","id":"DBLP:journals/iacr/MaleckasPA23","bibbaseid":"maleckas-paterson-albrecht-practicallyexploitablevulnerabilitiesinthejitsivideoconferencingsystem-2023","role":"author","urls":{"Paper":"https://eprint.iacr.org/2023/1118"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"http://dblp.org/pers/tb2/a/Albrecht:Martin_R=","dataSources":["nNWn9GD9paFhQPHAh"],"keywords":[],"search_terms":["practically","exploitable","vulnerabilities","jitsi","video","conferencing","system","maleckas","paterson","albrecht"],"title":"Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System","year":2023}