Mannan et al., 2004 - Google Patents
Secure public instant messaging: A surveyMannan et al., 2004
View PDF- Document ID
- 7047374600344563028
- Author
- Mannan M
- van Oorschot P
- Publication year
- Publication venue
- Proceedings of Privacy, Security and Trust
External Links
Snippet
We provide a survey on security features and threats to existing Instant Messaging (IM) networks and discuss how currently available systems fail to provide adequate security in light of existing threats. Our discussion and analysis provide a starting point from which to …
- 238000004458 analytical method 0 abstract description 4
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Barrett et al. | SSH, the secure shell: the definitive guide | |
Huang et al. | Using one-time passwords to prevent password phishing attacks | |
Adeyinka | Internet attack methods and internet security technology | |
US8631227B2 (en) | Processing encrypted electronic documents | |
Mannan et al. | On instant messaging worms, analysis and countermeasures | |
Chakravarty et al. | Detecting traffic snooping in tor using decoys | |
Mannan et al. | Secure public instant messaging: A survey | |
Hindocha et al. | Malicious threats and vulnerabilities in instant messaging | |
Emigh | The crimeware landscape: Malware, phishing, identity theft and beyond | |
Wozak et al. | End-to-end security in telemedical networks–a practical guideline | |
Mannan | Secure public instant messaging | |
Moya | Analysis and evaluation of the snort and bro network intrusion detection systems | |
Lee et al. | Threats hidden in office network: Mechanism of credential harvesting for lateral movement | |
Bu et al. | The new era of botnets | |
Sachs et al. | Securing IM and P2P Applications for the Enterprise | |
Ciesla | Common Attacks Against Cryptographic Systems | |
Xie et al. | Secure instant messaging in enterprise-like networks | |
Ali | Social Engineering: Phishing latest and future techniques | |
Ngongang | Cloud Computing Security | |
Alassouli | Hacking of Computer Networks | |
Zeltser | The evolution of malicious agents | |
Liakopoulos | Malware analysis & C2 covert channels | |
Rao | Threats and security of Web services-a theoretical short study | |
Glasser | C&C architecture: Automation of the deployment of a sophisticated infrastructure, for new malicious uses, harder to detect | |
Sasko et al. | Security of Instant Messengers |