Online citations, reference lists, and bibliographies.
← Back to Search

Secure Data Exchange Based On Social Networks Public Key Distribution

K. Podlaski, A. Hlobaz, P. Milczarski
Published 2015 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
The mobile devices became the most spread tools used for everyday communication. The users of mobile applications demand high level of security. All existing encryption protocols require from the users additional knowledge and resources. On the other hand the common user does not have required knowledge and skills about security. In this paper we discuss the problem of public key distribution between interested parties. We propose to use a popular social media as a channel to publish public keys. That way of keys distribution allows the owner of the key to connect easily with the desired person or institution, that is not always easy. Recognizing that the mobile devices are the main tool of communication, we present example of a mobile application that uses the proposed security method.
This paper references

This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar