About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Internet of Things. IoT Infrastructures. Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I

Research Article

Secure Data Exchange Based on Social Networks Public Key Distribution

Download(Requires a free EAI acccount)
334 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-47063-4_5,
        author={Krzysztof Podlaski and Artur Hłobaż and Piotr Milczarski},
        title={Secure Data Exchange Based on Social Networks Public Key Distribution},
        proceedings={Internet of Things. IoT Infrastructures. Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I},
        proceedings_a={IOT360},
        year={2017},
        month={1},
        keywords={Secure communication Data encryption Public key distribution Mobile applications Social networks},
        doi={10.1007/978-3-319-47063-4_5}
    }
    
  • Krzysztof Podlaski
    Artur Hłobaż
    Piotr Milczarski
    Year: 2017
    Secure Data Exchange Based on Social Networks Public Key Distribution
    IOT360
    Springer
    DOI: 10.1007/978-3-319-47063-4_5
Krzysztof Podlaski1,*, Artur Hłobaż1,*, Piotr Milczarski1,*
  • 1: University of Lodz
*Contact email: podlaski@uni.lodz.pl, artur.hlobaz@uni.lodz.pl, piotr.milczarski@uni.lodz.pl

Abstract

The mobile devices became the most spread tools used for everyday communication. The users of mobile applications demand high level of security. All existing encryption protocols require from the users additional knowledge and resources. On the other hand the common user does not have required knowledge and skills about security. In this paper we discuss the problem of public key distribution between interested parties. We propose to use a popular social media as a channel to publish public keys. That way of keys distribution allows the owner of the key to connect easily with the desired person or institution, that is not always easy. Recognizing that the mobile devices are the main tool of communication, we present example of a mobile application that uses the proposed security method.

Keywords
Secure communication Data encryption Public key distribution Mobile applications Social networks
Published
2017-01-05
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-47063-4_5
Copyright © 2015–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL