Proceedings of the Sixth Asian Internet Engineering Conference on - AINTEC '10 2010
DOI: 10.1145/1930286.1930292
|View full text |Cite
|
Sign up to set email alerts
|

Implementing instant messaging using named data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
4
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Basically, the projected messaging/chat system is anticipated to supply a line between clients via a server using encryption based on RSA in a Client/Server environment [9][10].The goal for this study is to use client/server design to accomplish secure chat between clients while not the server having the ability to decode the message by mistreatment one layer of coding between the clients and also the server, so a second layer of coding between the clients in an exceedingly chat space [10] [11]. All the used coding processes supported RSA algorithmic rule.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Basically, the projected messaging/chat system is anticipated to supply a line between clients via a server using encryption based on RSA in a Client/Server environment [9][10].The goal for this study is to use client/server design to accomplish secure chat between clients while not the server having the ability to decode the message by mistreatment one layer of coding between the clients and also the server, so a second layer of coding between the clients in an exceedingly chat space [10] [11]. All the used coding processes supported RSA algorithmic rule.…”
Section: Methodsmentioning
confidence: 99%
“…On the receiving end, the program utilizes a client's private key to decrypt received messages. In 1977, Ron Rivest, Adi Shamir and Leonard Adleman introduced a cryptographic algorithm, RSA, which is named for the first letter in each of its inventors' last name[11]. RSA's motivation is Diffie-Hellman Algorithm which describes the idea of such an algorithm that enables public-key cryptosystem.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Nowadays, a new approach for networking that enables the communication to implement by the means of content instead the location called the Content-Centric networking (CCN) [1], [4], [9], [10], which is more benefit such as reduces the congestion and latency, supports the new and emerging applications on mobile and wireless facilities. Many research project during the recently year going under the information centric network such as PSIRP [7], CCNx [6], and NDN [5].…”
Section: Introductionmentioning
confidence: 99%