Enforcing End-to-end Security for Remote Conference Applications | IEEE Conference Publication | IEEE Xplore