Secure data exchange based on social networks public key distribution

5Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The mobile devices became the most spread tools used for everyday communication. The users of mobile applications demand high level of security. All existing encryption protocols require from the users additional knowledge and resources. On the other hand the common user does not have required knowledge and skills about security. In this paper we discuss the problem of public key distribution between interested parties. We propose to use a popular social media as a channel to publish public keys. That way of keys distribution allows the owner of the key to connect easily with the desired person or institution, that is not always easy. Recognizing that the mobile devices are the main tool of communication, we present example of a mobile application that uses the proposed security method.

Cite

CITATION STYLE

APA

Podlaski, K., Hłobaż, A., & Milczarski, P. (2016). Secure data exchange based on social networks public key distribution. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 169, pp. 52–63). Springer Verlag. https://doi.org/10.1007/978-3-319-47063-4_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free