The 17th Asia Pacific Conference on Communications 2011
DOI: 10.1109/apcc.2011.6152921
|View full text |Cite
|
Sign up to set email alerts
|

A secure private instant messenger

Abstract: Instant messenger is an IM application that allows communication in a secured manner. A secured private IM is needed to ensure data transmission between sender and recipient more secure. This paper presents a secure IM architecture. A secure architecture is divided into four modules; chat module, transceiver module, secure module, and routing module. In this research, hash algorithm was applied in secure module. The main function of hash algorithm is to encrypt and convert into hash value. The purpose of this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Purpose of encryption is to make sure unauthorized person cannot view the original data or information through the network. IM application for securing IM has developed and tested for security analysis [19].…”
Section: Comparison Resultsmentioning
confidence: 99%
“…Purpose of encryption is to make sure unauthorized person cannot view the original data or information through the network. IM application for securing IM has developed and tested for security analysis [19].…”
Section: Comparison Resultsmentioning
confidence: 99%
“…Furthermore, SSL can provide a secure channel for online conversation. IM security in corporate network should involve establishment of an IM usage policy and properly configure perimeter firewalls to block all non-approved instant messaging and transferred files [3].…”
Section: Discussionmentioning
confidence: 99%
“…Most cryptographic algorithms provide a means for secret and authentic communication. According to [3], in 2011, a research paper proposed a secure module for the instant messaging which adds an additional "secure module" and apply a hash algorithm to encrypt the path between transceiver and routing modules as shown in Fig. 1 [3].…”
Section: A Instant Messaging and Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, if message M consists of M1 and M2, the first generated code can be detected easier. It is not sufficient for OSN with large spectrum users [21].…”
Section: Conventional Osn Security Schemesmentioning
confidence: 99%