The Many Faces of End-to-End Encryption and Their Security Analysis | IEEE Conference Publication | IEEE Xplore