{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:11:32Z","timestamp":1725909092708},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319569901"},{"type":"electronic","value":"9783319569918"}],"license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-56991-8_47","type":"book-chapter","created":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T23:57:16Z","timestamp":1503359836000},"page":"647-657","source":"Crossref","is-referenced-by-count":0,"title":["SIMSSP: Secure Instant Messaging System for Smart Phones"],"prefix":"10.1007","author":[{"given":"Kahtan","family":"Aziz","sequence":"first","affiliation":[]},{"given":"Saed","family":"Tarapiah","sequence":"additional","affiliation":[]},{"given":"Shadi","family":"Atalla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"issue":"7","key":"47_CR1","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MC.2005.234","volume":"38","author":"N Leavitt","year":"2005","unstructured":"Leavitt, N.: Instant messaging: a new target for hackers. Computer 38(7), 20\u201323 (2005)","journal-title":"Computer"},{"key":"47_CR2","unstructured":"Mannan, M., van Oorschot, P.C.: Secure public instant messaging: a survey. In: Proceedings of Privacy, Security and Trust (2004)"},{"key":"47_CR3","volume-title":"Cryptography and Network Security","author":"A Kahate","year":"2013","unstructured":"Kahate, A.: Cryptography and Network Security. Tata McGraw-Hill Education, New Delhi (2013)"},{"key":"47_CR4","volume-title":"Essentials of Management Information Systems","author":"JP Laudon","year":"2013","unstructured":"Laudon, J.P., Laudon, K.C.: Essentials of Management Information Systems, 10th edn. Prentice Hall, Upper Saddle River (2013)","edition":"10"},{"key":"47_CR5","unstructured":"Arifin, A., Mammi, H.K.: Study on the effectiveness of securing instant messaging using one time pad. Int. J. Adv. Soft Comput. Appl. 6(1) (2014)"},{"issue":"3","key":"47_CR6","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/S1353-4858(04)00050-9","volume":"2004","author":"G Ollmann","year":"2004","unstructured":"Ollmann, G.: Securing against the \"threat\" of instant messaging. Netw. Secur. J. 2004(3), 8\u201311 (2004)","journal-title":"Netw. Secur. J."},{"key":"47_CR7","unstructured":"Carey, C.A., Robinson, B.A.: Method and system for instant messaging across cellular networks and a public data network, U.S. Patent No. 6,714,793. 30, March 2004"},{"issue":"2","key":"47_CR8","first-page":"109","volume":"45","author":"GS Vernam","year":"1926","unstructured":"Vernam, G.S.: Cipher printing telegraph systems: for secret wire and radio telegraphic communications. J. AIEE 45(2), 109\u2013115 (1926)","journal-title":"J. AIEE"},{"key":"47_CR9","volume-title":"SSL and TLS: Designing and Building Secure Systems","author":"E Rescorla","year":"2001","unstructured":"Rescorla, E.: SSL and TLS: Designing and Building Secure Systems. Addison Wesley, Boston (2001)"},{"key":"47_CR10","doi-asserted-by":"crossref","unstructured":"Saint-Andre, P.: Extensible messaging and presence protocol. XMPP, Core (2011)","DOI":"10.17487\/rfc6122"},{"key":"47_CR11","doi-asserted-by":"crossref","unstructured":"Rosenberg, J.: SIMPLE made simple: an overview of the IETF specifications for instant messaging and presence using the session initiation protocol (SIP) (2013)","DOI":"10.17487\/rfc6914"},{"issue":"4","key":"47_CR12","first-page":"31","volume":"18","author":"C-H Yang","year":"2008","unstructured":"Yang, C.-H., et al.: Design and implementation of a secure instant messaging service based on elliptic-curve cryptography. J. Comput. 18(4), 31\u201338 (2008)","journal-title":"J. Comput."},{"key":"47_CR13","unstructured":"Egan, S., et al.: Pidgin. http:\/\/www.pidgin.im\/ . Accessed Jan 2016"},{"key":"47_CR14","unstructured":"Microsoft Corp: C# Language. http:\/\/www.microsoft.com\/ . Accessed Mar 2016"},{"key":"47_CR15","unstructured":"Xamarin Corp.: Xamarin: Mobile App Development & App Creation Software. http:\/\/www.Xamarin.com\/ . Accessed Mar 2016"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56991-8_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T13:04:05Z","timestamp":1570021445000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-56991-8_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"ISBN":["9783319569901","9783319569918"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56991-8_47","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2017,8,23]]}}}