Secure Key Distribution over TOR Networks in Mobile Social Networks
Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.2, No. 2)Publication Date: 2014-02-28
Authors : S.Sasikumar N.Radhika U.Saravanakumar;
Page : 19-25
Keywords : ;
Abstract
In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounterbased social networks. To construct a flexible framework for secure encounter-based social networks. This can be used to construct networks that offer different security, privacy, and availability guarantees. To ideal encounter-based social networks need to satisfy, and introduce a generic framework for constructing encounter-based social networks.
Other Latest Articles
- An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks
- SECURE DATA TRANSMISSION OVER WIMAX NETWORKS USING VPN TECHNOLOGY IN REALTIME ENVIRONMENTS?
- A New Key Management Paradigm for Fast Transmission in Remote Co-operative Groups?
- Degraded Documents Recovering by Using Adaptive Binarizations and Convex Hull Concept?
- VLSI Implementation and Analysis of Parallel Adders for Low Power Applications?
Last modified: 2014-02-14 15:47:33