The end of Eavesdropping Attacks through the Use of Advanced End to End Encryption Mechanisms | IEEE Conference Publication | IEEE Xplore