Is secure instant messaging trustworthy?

被引:0
|
作者
Bolcer, GA [1 ]
机构
[1] Endeavors Technol, Irvine, CA USA
来源
COMMUNICATIONS NEWS | 2002年 / 39卷 / 12期
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
引用
收藏
页码:9 / 9
页数:1
相关论文
共 50 条
  • [1] How secure is instant messaging?
    Anon
    [J]. PC World (San Francisco, CA), 2002, 20 (10):
  • [2] A trustworthy email system based on instant messaging
    Zhang, Wenmao
    Bi, Jun
    Zhang, Miao
    Qin, Zheng
    [J]. BUSINESS INFORMATION SYSTEMS, PROCEEDINGS, 2007, 4439 : 598 - +
  • [3] A Highly Secure Instant Messaging Protocol
    Kungpisdan, Supakorn
    Moonviriyakit, Nitoon
    [J]. WMSCI 2010: 14TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, 2010, : 155 - 160
  • [4] A protocol for secure public Instant Messaging
    Mannan, Mohammad
    van Oorschot, Paul C.
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2006, 4107 : 20 - 35
  • [5] Secure Instant Messaging Application in Prenatal Care
    Ezra, Osnat
    Toren, Arik
    Tadmor, Ofer
    Katorza, Eldad
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2020, 44 (04)
  • [6] Secure Instant Messaging Application in Prenatal Care
    Osnat Ezra
    Arik Toren
    Ofer Tadmor
    Eldad Katorza
    [J]. Journal of Medical Systems, 2020, 44
  • [7] Secure Key Exchange by NFC for Instant Messaging
    Govender, Castello
    van Niekerk, Brett
    [J]. 2021 CONFERENCE ON INFORMATION COMMUNICATIONS TECHNOLOGY AND SOCIETY (ICTAS), 2021, : 27 - 33
  • [8] SIMSSP: Secure Instant Messaging System for Smart Phones
    Aziz, Kahtan
    Tarapiah, Saed
    Atalla, Shadi
    [J]. PROCEEDINGS OF SAI INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS) 2016, VOL 2, 2018, 16 : 647 - 657
  • [9] Secure group instant messaging using cryptographic primitives
    Thukral, A
    Zou, X
    [J]. NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1002 - 1011
  • [10] SIMS: A comprehensive approach for a Secure Instant Messaging Sifter
    Fahrnberger, Guenter
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 164 - 173