메뉴 건너뛰기




Volumn , Issue , 2011, Pages 821-825

A secure private instant messenger

Author keywords

Hash Algorithm; Private Instant Messenger

Indexed keywords

HASH ALGORITHM; HASH VALUE; INSTANT MESSENGERS; PRIVATE INSTANT MESSENGER; ROUTING MODULES; SECURE ARCHITECTURES; TRANSCEIVER MODULES;

EID: 84857823595     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/APCC.2011.6152921     Document Type: Conference Paper
Times cited : (11)

References (10)
  • 1
    • 1842454700 scopus 로고    scopus 로고
    • Securing against the threat of instant messengers
    • March 2004
    • Gunter Ollmann (2004). Securing against the threat of instant messengers. Network Security, Vol. 2004, March 2004, pp. 8-11.
    • (2004) Network Security , vol.2004 , pp. 8-11
    • Ollmann, G.1
  • 2
    • 33746287237 scopus 로고    scopus 로고
    • Instant messaging vs. instant compromise
    • July 2006
    • Shirley O'Sullivan (2006). Instant messaging vs. instant compromise. Network Security, Vol. 2006, Issue 7, July 2006, pp. 4-6.
    • (2006) Network Security , vol.2006 , Issue.7 , pp. 4-6
    • O'Sullivan, S.1
  • 3
    • 77956182636 scopus 로고    scopus 로고
    • Why shy people use instant messaging: Loneliness and other motives
    • C. Albert Bardi, Michael F. Brady (2010). Why shy people use instant messaging: Loneliness and other motives. Computer in Human Behaviour, 26(2010), pp. 1722-1726.
    • (2010) Computer in Human Behaviour , vol.26 , Issue.2010 , pp. 1722-1726
    • Bardi, C.A.1    Brady, M.F.2
  • 4
    • 33846796060 scopus 로고    scopus 로고
    • Building a secure instant messaging environment
    • January 2007
    • Donal Casey (2007). Building a secure instant messaging environment. Network Security, Vol. 2007, January 2007, pp. 18-20.
    • (2007) Network Security , vol.2007 , pp. 18-20
    • Casey, D.1
  • 7
    • 77957556170 scopus 로고    scopus 로고
    • VLSI Design and implementation of combined secure hash algorithm SHA-512
    • CNSA 2010
    • R. Kayalvizhi, R. Harihara Subramanian, R. Girish Santhosh, J. Gurubaran, V. Vaidehi (2010). VLSI Design and implementation of combined secure hash algorithm SHA-512. CNSA 2010, CCIS 89, pp. 105-113.
    • (2010) CCIS , vol.89 , pp. 105-113
    • Kayalvizhi, R.1    Subramanian, R.H.2    Santhosh, R.G.3    Gurubaran, J.4    Vaidehi, V.5
  • 8
    • 33750729555 scopus 로고    scopus 로고
    • Improving SHA-2 hardware implementations
    • CHES 2006
    • Ricardo Chaves, George Kuzmanov (2006). Improving SHA-2 hardware implementations. CHES 2006, LNCS 4249, pp. 298-310.
    • (2006) LNCS , vol.4249 , pp. 298-310
    • Chaves, R.1    Kuzmanov, G.2
  • 9
    • 41549107480 scopus 로고    scopus 로고
    • Phychometric analysis of the short-form UCLA loneliness scale (ULS-8) in Taiwanese undergraduate students
    • Wu, C.-h., & Yao, G. (2008). Phychometric analysis of the short-form UCLA loneliness scale (ULS-8) in Taiwanese undergraduate students. Personality and Individual Differences, 44(8), pp. 1762-1771.
    • (2008) Personality and Individual Differences , vol.44 , Issue.8 , pp. 1762-1771
    • Wu, C.-H.1    Yao, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.