2014 IEEE International Congress on Big Data 2014
DOI: 10.1109/bigdata.congress.2014.51
|View full text |Cite
|
Sign up to set email alerts
|

How to Send a Self-Destructing Email: A Method of Self-Destructing Email System

Abstract: Before the project PRISM was revealed to the public by Edward Snowden only a few people realized emails were being watched by the government. For the benefits that Big Data technologies such as massive distributed storage and user behavior analysis and so on bring, emails became one of the most popular Big Data that has been aimed at as a huge source of intelligence by some organizations spying on public accounts every hour every day. Our research work was just opposite to what the NSA has done: To design and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…In this Big Data era personal data, communications and all the other personal privacies are just at stake [1], [2], [3], [4]. A common case is that the user private information could be visited by multiple agents in the course of service, each having different access rights for its own purposes.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In this Big Data era personal data, communications and all the other personal privacies are just at stake [1], [2], [3], [4]. A common case is that the user private information could be visited by multiple agents in the course of service, each having different access rights for its own purposes.…”
Section: Introductionmentioning
confidence: 99%
“…These systems prefer P2P-like environments, but potentially face Sybil attacks [7] and, 2) those (e.g. [1], [15], [16]) that require a trusted third party (trusted authority) to manage and distribute the secrete key, thereby potentially facing scalability limitations.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation