Behera et al., 2022 - Google Patents
CryptedWe: An end-to-encryption with fake news detection messaging systemBehera et al., 2022
View PDF- Document ID
- 3299149243672116288
- Author
- Behera A
- Nayak B
- Subhadarshan S
- Nath N
- Publication year
- Publication venue
- Biologically Inspired Techniques in Many Criteria Decision Making: Proceedings of BITMDM 2021
External Links
Snippet
In the current pandemic situation while world has become overwhelmingly dependent on the online platform for communication, a big concern is raised over corroboration of privacy of data shared and receiving trusted information over popular messaging applications. Fake …
- 238000001514 detection method 0 title description 15
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/581—Real time or near real time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5825—Message adaptation based on network or terminal capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/14—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/38—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages in combination with wireless systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/06—Message adaptation based on network or terminal capabilities
- H04L51/066—Message adaptation based on network or terminal capabilities with adaptation of format
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations contains provisionally no documents
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11387986B1 (en) | Systems and methods for encryption and provision of information security using platform services | |
Awan et al. | Secure framework enhancing AES algorithm in cloud computing | |
Lucas et al. | Flybynight: mitigating the privacy risks of social networking | |
Bokhari et al. | Reducing the required time and power for data encryption and decryption using K-NN machine learning | |
Sharma et al. | A hybrid cryptographic technique for file storage mechanism over cloud | |
Jammula et al. | Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system | |
Luqman et al. | Privacy and security implications of cloud-based AI services: A survey | |
Arvind et al. | Secure data classification using superior naive classifier in agent based mobile cloud computing | |
Sodagudi et al. | An approach to identify data leakage in secure communication | |
Li et al. | Blockchain and or based data sharing solution for internet of things | |
Vivek | Attacks on a privacy-preserving publish-subscribe system and a ride-hailing service | |
Behera et al. | CryptedWe: An end-to-encryption with fake news detection messaging system | |
Kapil et al. | Managing multimedia big data: Security and privacy perspective | |
Babbar et al. | Detecting Cyberattacks to Federated Learning on Software-Defined Networks | |
Ashokkumar et al. | IOT-ENABLED INFRASTRUCTURE PRIVACY PRESERVATION IN BIG DATA. | |
Shah et al. | Performance Analysis of Various Encryption Algorithms for Securing Modules of Educational Chatbot | |
Allagi et al. | A hybrid model for data security and preserving anonymity using machine learning | |
Cho et al. | Hybrid wbc: Secure and efficient white-box encryption schemes | |
Narasimman et al. | Arcana: enabling private posts on public microblog platforms | |
Hammoudeh et al. | Empowering Security in Cloud Environment Using Encryption Technique | |
Naveen Kumar et al. | Chip-based key distribution technique | |
Deb et al. | A Novel Data Encryption Technique Based on DNA Sequence | |
Ali et al. | Blockchain-Based Secure File Storage with Hybrid Cryptography and Machine Learning for Malware Detection | |
Nagpal et al. | Cryptoviral extortion: Evolution, scenarios, and analysis | |
Gambhir et al. | Handling Security Issues in Fog Computing Environment Using Blowfish Encryption Algorithm |