[PDF][PDF] Social Networks IM Forensics: Encryption Analysis.

N Al Barghouthy, H Said - J. Commun., 2013 - researchgate.net
In most regards, the twenty-first century may not bring revolutionary changes in electronic
messaging technology in terms of applications or protocols. Security issues that have long …

Enhanced instant message security and privacy protection scheme for mobile social network systems

Z Wang, Z Ma, S Luo, H Gao - IEEE Access, 2018 - ieeexplore.ieee.org
Instant messaging (IM) systems can be considered the most frequently used applications in
mobile social networks. Nowadays, people are becoming increasingly concerned about …

Reinforcing the security of instant messaging systems using an enhanced honey encryption scheme: the case of WhatsApp

EO Abiodun, A Jantan, OI Abiodun… - Wireless Personal …, 2020 - Springer
In this paper, an enhanced honey encryption (HE) scheme for reinforcing the security of
instant messaging systems and confounding the time and resources of malicious persons is …

[PDF][PDF] DeepSentiment: Finding Malicious Sentiment in Online Social Network based on Dynamic Deep Learning.

P Wanda, HJ Jie - IAENG International Journal of Computer …, 2019 - repositori.respati.ac.id
Current Online Social Network (OSN) needs real-time and adaptive security model. The
tremendous success of deep learning algorithms at computer vision tasks in recent years …

Secure mobile instant messaging key exchanging protocol with one-time-pad substitution transposition cryptosystem

HC Chen, H Wijayanto, CH Chang… - … IEEE conference on …, 2016 - ieeexplore.ieee.org
The Mobile Instant Messaging Service (MIMS) is a popular feature on mobile communication
devices today. It is a powerful and cheap facility to send and to receive messages through a …

Efficient message security based Hyper Elliptic Curve Cryptosystem (HECC) for mobile instant messenger

P Wanda, BS Hantono - 2014 The 1st International …, 2014 - ieeexplore.ieee.org
Mobile Instant Messenger is an IM application that need communication fastly and in a
secured manner. A good level security with strong autentication must be applied to ensure …

Efficient data security for mobile instant messenger

P Wanda, HJ Jie - … (Telecommunication Computing Electronics …, 2018 - telkomnika.uad.ac.id
Instant Messenger (IM) becomes one of the most popular applications in mobile technology
and communication. A lot of users around the world installed it for daily activities. Current IM …

Model of secure P2P mobile instant messaging based on virtual network

P Wanda, BS Hantono - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Mobile Instant Messenger is one of the most application which use to exchange a message
between Sender and Receiver over public network, so that it is very important building an …

The existence of cryptography: a study on instant messaging

VB Liwandouw, AD Wowor - Procedia Computer Science, 2017 - Elsevier
The use of smartphone for communication through the Instant Messaging (IM) application
has become a dependency and trend model in society. Thus, choosing the right …

Survey of instant messaging applications encryption methods

AT Kabakuş, R Kara - Avrupa Bilim ve Teknoloji Dergisi, 2015 - dergipark.org.tr
Instant messaging applications has already taken the place of traditional Short Messaging
Service (SMS) and Multimedia Messaging Service (MMS) due to their popularity and usage …