[go: up one dir, main page]

Behera et al., 2022 - Google Patents

CryptedWe: An end-to-encryption with fake news detection messaging system

Behera et al., 2022

View PDF
Document ID
3299149243672116288
Author
Behera A
Nayak B
Subhadarshan S
Nath N
Publication year
Publication venue
Biologically Inspired Techniques in Many Criteria Decision Making: Proceedings of BITMDM 2021

External Links

Snippet

In the current pandemic situation while world has become overwhelmingly dependent on the online platform for communication, a big concern is raised over corroboration of privacy of data shared and receiving trusted information over popular messaging applications. Fake …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/581Real time or near real time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/5825Message adaptation based on network or terminal capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/14Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with selective forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/38Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages in combination with wireless systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/06Message adaptation based on network or terminal capabilities
    • H04L51/066Message adaptation based on network or terminal capabilities with adaptation of format
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/24Presence management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations contains provisionally no documents

Similar Documents

Publication Publication Date Title
US11387986B1 (en) Systems and methods for encryption and provision of information security using platform services
Awan et al. Secure framework enhancing AES algorithm in cloud computing
Lucas et al. Flybynight: mitigating the privacy risks of social networking
Bokhari et al. Reducing the required time and power for data encryption and decryption using K-NN machine learning
Sharma et al. A hybrid cryptographic technique for file storage mechanism over cloud
Jammula et al. Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system
Luqman et al. Privacy and security implications of cloud-based AI services: A survey
Arvind et al. Secure data classification using superior naive classifier in agent based mobile cloud computing
Sodagudi et al. An approach to identify data leakage in secure communication
Li et al. Blockchain and or based data sharing solution for internet of things
Vivek Attacks on a privacy-preserving publish-subscribe system and a ride-hailing service
Behera et al. CryptedWe: An end-to-encryption with fake news detection messaging system
Kapil et al. Managing multimedia big data: Security and privacy perspective
Babbar et al. Detecting Cyberattacks to Federated Learning on Software-Defined Networks
Ashokkumar et al. IOT-ENABLED INFRASTRUCTURE PRIVACY PRESERVATION IN BIG DATA.
Shah et al. Performance Analysis of Various Encryption Algorithms for Securing Modules of Educational Chatbot
Allagi et al. A hybrid model for data security and preserving anonymity using machine learning
Cho et al. Hybrid wbc: Secure and efficient white-box encryption schemes
Narasimman et al. Arcana: enabling private posts on public microblog platforms
Hammoudeh et al. Empowering Security in Cloud Environment Using Encryption Technique
Naveen Kumar et al. Chip-based key distribution technique
Deb et al. A Novel Data Encryption Technique Based on DNA Sequence
Ali et al. Blockchain-Based Secure File Storage with Hybrid Cryptography and Machine Learning for Malware Detection
Nagpal et al. Cryptoviral extortion: Evolution, scenarios, and analysis
Gambhir et al. Handling Security Issues in Fog Computing Environment Using Blowfish Encryption Algorithm