[go: up one dir, main page]

Mannan et al., 2004 - Google Patents

Secure public instant messaging: A survey

Mannan et al., 2004

View PDF
Document ID
7047374600344563028
Author
Mannan M
van Oorschot P
Publication year
Publication venue
Proceedings of Privacy, Security and Trust

External Links

Snippet

We provide a survey on security features and threats to existing Instant Messaging (IM) networks and discuss how currently available systems fail to provide adequate security in light of existing threats. Our discussion and analysis provide a starting point from which to …
Continue reading at users.encs.concordia.ca (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Barrett et al. SSH, the secure shell: the definitive guide
Huang et al. Using one-time passwords to prevent password phishing attacks
Adeyinka Internet attack methods and internet security technology
US8631227B2 (en) Processing encrypted electronic documents
Mannan et al. On instant messaging worms, analysis and countermeasures
Chakravarty et al. Detecting traffic snooping in tor using decoys
Mannan et al. Secure public instant messaging: A survey
Hindocha et al. Malicious threats and vulnerabilities in instant messaging
Emigh The crimeware landscape: Malware, phishing, identity theft and beyond
Wozak et al. End-to-end security in telemedical networks–a practical guideline
Mannan Secure public instant messaging
Moya Analysis and evaluation of the snort and bro network intrusion detection systems
Lee et al. Threats hidden in office network: Mechanism of credential harvesting for lateral movement
Bu et al. The new era of botnets
Sachs et al. Securing IM and P2P Applications for the Enterprise
Ciesla Common Attacks Against Cryptographic Systems
Xie et al. Secure instant messaging in enterprise-like networks
Ali Social Engineering: Phishing latest and future techniques
Ngongang Cloud Computing Security
Alassouli Hacking of Computer Networks
Zeltser The evolution of malicious agents
Liakopoulos Malware analysis & C2 covert channels
Rao Threats and security of Web services-a theoretical short study
Glasser C&C architecture: Automation of the deployment of a sophisticated infrastructure, for new malicious uses, harder to detect
Sasko et al. Security of Instant Messengers