Marsalek et al., 2018 - Google Patents
SeDiCom: A Secure Distributed Privacy-Preserving Communication PlatformMarsalek et al., 2018
- Document ID
- 1343509184011110973
- Author
- Marsalek A
- Prünster B
- Suzic B
- Zefferer T
- Publication year
- Publication venue
- International Conference on Information Systems Security
External Links
Snippet
Efficient and secure electronic communication is crucial for successful business-to-business processes. Due to the weaknesses of e-mail communication, a shift towards instant messaging can also be observed in this context. However, reliance on instant-messaging …
- 238000004891 communication 0 title abstract description 33
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Eskandarian et al. | Express: Lowering the cost of metadata-hiding communication with cryptographic privacy | |
| De Cristofaro et al. | Hummingbird: Privacy at the time of twitter | |
| US8522011B2 (en) | Computer implemented method for authenticating a user | |
| Wang et al. | LAMANCO: A lightweight anonymous mutual authentication scheme for $ N $-times computing offloading in IoT | |
| Fotiou et al. | Interacting with the Internet of Things using smart contracts and blockchain technologies | |
| Huang et al. | Blockchain‐based fair three‐party contract signing protocol for fog computing | |
| Bartusek et al. | End-to-end secure messaging with traceability only for illegal content | |
| Schwittmann et al. | SoNet--Privacy and replication in federated online social networks | |
| McCorry et al. | Authenticated key exchange over bitcoin | |
| Martiny et al. | Improving Signal's Sealed Sender. | |
| Job et al. | A modified secure version of the Telegram protocol (MTProto) | |
| Zhu et al. | A collaborative framework for privacy protection in online social networks | |
| CN116089986B (en) | Electronic document management method, device, equipment and medium capable of configuring security policy | |
| Van Oorschot | Public key cryptography’s impact on society: how Diffie and Hellman changed the world | |
| Chen et al. | Anonymous end to end encryption group messaging protocol based on asynchronous ratchet tree | |
| Pal et al. | WiP: Criminal smart contract for private key theft in end to end encrypted applications | |
| Marsalek et al. | SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform | |
| Hans et al. | An Evaluation and Implementation of Pretty Good Privacy (PGP) in Wireless Network Security | |
| Tsai et al. | Secure data-sharing using distributed environmental matching keys | |
| Yuen et al. | Towards a cryptographic treatment of publish/subscribe systems | |
| Chen et al. | A secure group-based mobile chat protocol | |
| Chaum et al. | UDM: Private user discovery with minimal information disclosure | |
| Marsalek et al. | Privacy-Preserving Communication | |
| Parhi et al. | Mp3: A more efficient private presence protocol | |
| Sherin Beevi et al. | Blockchain Based Email Communication with SHA-256 Algorithm |