[go: up one dir, main page]

Marsalek et al., 2018 - Google Patents

SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform

Marsalek et al., 2018

Document ID
1343509184011110973
Author
Marsalek A
Prünster B
Suzic B
Zefferer T
Publication year
Publication venue
International Conference on Information Systems Security

External Links

Snippet

Efficient and secure electronic communication is crucial for successful business-to-business processes. Due to the weaknesses of e-mail communication, a shift towards instant messaging can also be observed in this context. However, reliance on instant-messaging …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/12Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/24Presence management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication

Similar Documents

Publication Publication Date Title
Eskandarian et al. Express: Lowering the cost of metadata-hiding communication with cryptographic privacy
De Cristofaro et al. Hummingbird: Privacy at the time of twitter
US8522011B2 (en) Computer implemented method for authenticating a user
Wang et al. LAMANCO: A lightweight anonymous mutual authentication scheme for $ N $-times computing offloading in IoT
Fotiou et al. Interacting with the Internet of Things using smart contracts and blockchain technologies
Huang et al. Blockchain‐based fair three‐party contract signing protocol for fog computing
Bartusek et al. End-to-end secure messaging with traceability only for illegal content
Schwittmann et al. SoNet--Privacy and replication in federated online social networks
McCorry et al. Authenticated key exchange over bitcoin
Martiny et al. Improving Signal's Sealed Sender.
Job et al. A modified secure version of the Telegram protocol (MTProto)
Zhu et al. A collaborative framework for privacy protection in online social networks
CN116089986B (en) Electronic document management method, device, equipment and medium capable of configuring security policy
Van Oorschot Public key cryptography’s impact on society: how Diffie and Hellman changed the world
Chen et al. Anonymous end to end encryption group messaging protocol based on asynchronous ratchet tree
Pal et al. WiP: Criminal smart contract for private key theft in end to end encrypted applications
Marsalek et al. SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform
Hans et al. An Evaluation and Implementation of Pretty Good Privacy (PGP) in Wireless Network Security
Tsai et al. Secure data-sharing using distributed environmental matching keys
Yuen et al. Towards a cryptographic treatment of publish/subscribe systems
Chen et al. A secure group-based mobile chat protocol
Chaum et al. UDM: Private user discovery with minimal information disclosure
Marsalek et al. Privacy-Preserving Communication
Parhi et al. Mp3: A more efficient private presence protocol
Sherin Beevi et al. Blockchain Based Email Communication with SHA-256 Algorithm