2020
DOI: 10.1007/s11277-020-07163-y
|View full text |Cite
|
Sign up to set email alerts
|

Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…The CDM reads each word in the sentence and disambiguates the underlying context by understanding its structural constituents in terms of meaning and transforms it as a syntactically and contextually realistic sentence by preserving the ontology with respect to the part of speech (POS) each word in the original document belong to. This approach takes its perspectives from the conceptual designs in the work of [10], where messages are translated to semantically equivalent messages.…”
Section: (A) Construction Of the Cdmmentioning
confidence: 99%
See 1 more Smart Citation
“…The CDM reads each word in the sentence and disambiguates the underlying context by understanding its structural constituents in terms of meaning and transforms it as a syntactically and contextually realistic sentence by preserving the ontology with respect to the part of speech (POS) each word in the original document belong to. This approach takes its perspectives from the conceptual designs in the work of [10], where messages are translated to semantically equivalent messages.…”
Section: (A) Construction Of the Cdmmentioning
confidence: 99%
“…Cyber-attacks are often thwarted through the use of security measures like encryption [9][10][11][12], access control [13], and others. One of the emerging methods for combating document exfiltration during cyberattacks makes use of deception-based mechanisms, which focus on exploiting adversaries' biases and altering their perception by supplying them with bogus or fake data to waste their time and resources.…”
Section: Introductionmentioning
confidence: 99%
“…Subsequently, the VGG16 network [35] explores the relationship between the depth and performance of convolutional neural networks, which has strong extensibility; the Inception network [36] differs from the previous two networks in that it adds a structure called Inception, the main advantage of which is the reduction of training parameters; the ResNet network [37] introduces residual network structure, and it can realize that the accuracy does not decrease with the network deepening. These classic neural networks and other network structure models continue to emerge, resulting in the application of neural networks in various fields, such as natural language processing [38] and information decryption [39,40], which bring great convenience to human life.…”
Section: Plos Onementioning
confidence: 99%
“…It is easy for the attacker to determine the key is wrong. If the HE technology is used, the attacker will obtain seemingly reasonable plaintext in order to deceive the attacker [27]. erefore, the attacker will fall into the dead cycle of trying the key to obtain the fake message constantly, so that the plaintext cannot be recovered.…”
Section: Scheme Designmentioning
confidence: 99%