ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Secure Key Distribution over TOR Networks in Mobile Social Networks

Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.2, No. 2)

Publication Date:

Authors : ;

Page : 19-25

Keywords : ;

Source : Downloadexternal Find it from : Google Scholarexternal


In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounterbased social networks. To construct a flexible framework for secure encounter-based social networks. This can be used to construct networks that offer different security, privacy, and availability guarantees. To ideal encounter-based social networks need to satisfy, and introduce a generic framework for constructing encounter-based social networks.

Last modified: 2014-02-14 15:47:33