2017 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) 2017
DOI: 10.1109/iemcon.2017.8117222
|View full text |Cite
|
Sign up to set email alerts
|

An application for end to end secure messaging service on Android supported device

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 5 publications
0
0
0
1
Order By: Relevance
“…because data is very sensitive it may contain our personal information or business information. so for providing a secure communication channel, we need to use encrypted messaging protocols which prevent data loss [5]. This paper highlights the utility needs for Users/server models and depicts configuration inquiries to be attended.…”
Section: Discussionmentioning
confidence: 99%

Encrypted chat application using RSA Algorithm

Nuli Namassivaya,
Sunkari Nithigna,
Sindhu Kovilala
et al. 2023
IJETMS
“…because data is very sensitive it may contain our personal information or business information. so for providing a secure communication channel, we need to use encrypted messaging protocols which prevent data loss [5]. This paper highlights the utility needs for Users/server models and depicts configuration inquiries to be attended.…”
Section: Discussionmentioning
confidence: 99%

Encrypted chat application using RSA Algorithm

Nuli Namassivaya,
Sunkari Nithigna,
Sindhu Kovilala
et al. 2023
IJETMS
“…Belum ada aplikasi chat yang menggabungkan dengan SSDLC dalam pengembangannya. Bahkan belum ada juga yang menggunakan infrastruktur kunci public untuk sisi integritas dan autentikasinya (A. H. Ali & Sagheer, 2017; R. M. Ali & Alsaad, 2020;Kuliya & Abubakar, 2020;MM et al, 2016;Nayak et al, 2017;Zebua et al, 2018) Hasil yang diperoleh untuk pengujian keamanan melalui MTMT, diperoleh 35 threat yang ada pada model. Selanjutnya, penulis merangkum ancaman-ancaman tersebut menjadi 10 ancaman secara garis besar.…”
Section: Hasil Dan Pembahasanunclassified