Detailed Information

Cited 2 time in webofscience Cited 1 time in scopus
Metadata Downloads

O2TR: Offline OTR messaging system under network disruption

Full metadata record
DC FieldValueLanguage
dc.contributor.authorDaghmehchi Firoozjaei, M.[Daghmehchi Firoozjaei, M.]-
dc.contributor.authorKim, M.[Kim, M.]-
dc.contributor.authorSong, J.[Song, J.]-
dc.contributor.authorKim, H.[Kim, H.]-
dc.date.accessioned2021-07-29T05:45:33Z-
dc.date.available2021-07-29T05:45:33Z-
dc.date.created2019-11-29-
dc.date.issued2019-05-
dc.identifier.issn0167-4048-
dc.identifier.urihttps://scholarworks.bwise.kr/skku/handle/2021.sw.skku/15929-
dc.description.abstractProviding a secure and efficient communication system under network disruption without a trusted third party remains a challenging issue. To develop a secure and efficient system in such situations, we extend the conventional Off-The-Record (OTR) protocol into a new protocol named offline OTR (O2TR). O2TR provides end-to-end security between users without requiring the assumption that they are persistently connected to each other. To show the feasibility of the proposed protocol, we implemented a prototype to support O2TR based on the Gajim XMMP instant messaging platform. Our experiments showed that O2TR can be used reliably even when the corresponding network party is temporarily broken down. Moreover, O2TR provides an efficient way to resume private sessions which is about 34% faster than the original OTR. We also proved the secrecy of O2TR using an automated verification tool called AVISPA. © 2018 Elsevier Ltd-
dc.publisherElsevier Ltd-
dc.titleO2TR: Offline OTR messaging system under network disruption-
dc.typeArticle-
dc.contributor.affiliatedAuthorDaghmehchi Firoozjaei, M.[Daghmehchi Firoozjaei, M.]-
dc.contributor.affiliatedAuthorKim, M.[Kim, M.]-
dc.contributor.affiliatedAuthorKim, H.[Kim, H.]-
dc.identifier.doi10.1016/j.cose.2018.12.013-
dc.identifier.scopusid2-s2.0-85059821873-
dc.identifier.wosid000459525800014-
dc.identifier.bibliographicCitationComputers and Security, v.82, pp.227 - 240-
dc.relation.isPartOfComputers and Security-
dc.citation.titleComputers and Security-
dc.citation.volume82-
dc.citation.startPage227-
dc.citation.endPage240-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass3-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.subject.keywordPlusSECURITY-
dc.subject.keywordAuthorKey management-
dc.subject.keywordAuthorOTR-
dc.subject.keywordAuthorPrivacy-preserving-
dc.subject.keywordAuthorReliability-
dc.subject.keywordAuthorSecurity-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Computing and Informatics > Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher KIM, HYOUNG SHICK photo

KIM, HYOUNG SHICK
Computing and Informatics (Computer Science and Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE