Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kumar, Ramesh
- A Reliable Authentication Protocol for Peer to Peer Based Applications
Abstract Views :158 |
PDF Views:1
Authors
Affiliations
1 Rajiv Gandhi Technical University, Bhopal, Madhya Pradesh, IN
1 Rajiv Gandhi Technical University, Bhopal, Madhya Pradesh, IN
Source
International Journal of Advanced Networking and Applications, Vol 12, No 5 (2021), Pagination: 4714-4718Abstract
The importance of data communication has taken a sharp increment due to digitalization. The security of data communication is a key issue and authentication mechanisms are the backbone of secure and reliable data communication. Researchers are trying to find lightweight authentication algorithms which can be used in variety of applications and useful for mobile phones as well. In this paper we propose an innovative mechanism of certificate generation for authentication. A user can run the entire mechanism without any external help. The certificate can be verified and stored by the receiver for further cryptographic usage. We also provide security analysis and advantages of the proposed mechanism briefly.Keywords
Authentication, Data Communication, Digital Signature, Public-Key Cryptography (PKC).References
- . A.J.Menezes, P.C.V.Oorschot, S.A.Vanstone, Handbook of applied cryptography, fifth edition, CRC press Inc., USA, ISBN 9780849385230, 2001.
- . W.Stallings, Cryptography and network security, principles and practices, fourth edition, Prentice Hall, ISBN-13: 978-0131873162, ISBN-10: 0131873164, 2005.
- . V. Shukla, A. Chaturvedi, N. Srivastava, Nanotechnology and cryptographic protocols: issues and possible solutions, Nanomaterials and energy, volume 8, issue 1, 2019, 1-6, DOI: 10.1680/jnaen.18.00006
- . V. Shukla, A. Chaturvedi, N. Srivastava, A secure stop and wait communication protocol for disturbed networks, Wireless personal communications, volume 110, 861-872, 2019, DOI: https://doi.org/10.1007/s11277019-06760-w
- . W. Wu, J. Zhou, Y. Xiang, L. Xu, How to achieve non-repudiation of origin with privacy protection in cloud computing, Journal of computer and system sciences, volume 79, issue 8, 2013, 1200-1213, DOI: https://doi.org/10.1016/j.jcss.2013.03.001
- . S. Vaudenay, Secure communications over insecure channels based on short authenticated strings, Advances in cryptology (part of the lecture notes in computer science book series (LNCS, volume 3621)), 2005, 309326, DOI: https://doi.org/10.1007/11535218_19
- . J.Moon, Y.Lee, J.Kim, D.Won, Improving an anonymous and provably secure authentication protocol for a mobile user, Security and communication networks, volume 2017, 2017, 1-13, DOI: https://doi.org/10.1155/2017/1378128.
- . V. Shukla, N. Srivastava , A. Chaturvedi, A bit commitment signcryption protocol for wireless transport layer security (wtls), IEEE international conference on electrical computer and electronics engineering, 2016, 8386, DOI: 10.1109/UPCON.2016.7894629
- . M. Trnka, T. Cerny, N. Stickney, Survey of authentication and authorization for the internet of things, Security and communication networks, volume 2018, 2018, 1-17, DOI: https://doi.org/10.1155/2018/4351603.
- . M. Alhaidary, S.K.M.D. M. Rahman, M. Zakariah, M.S. Hossain, A. Alamri, M.D. S.M. Haque, B. B. Gupta, Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the OffPAD Protocol, IEEE access, volume 6, 2018, 6071 -6081, DOI: 10.1109/ACCESS.2017.2789301.
- . A. Chaturvedi, V. Shukla, Tripartite key agreement protocol using conjugacy problem in braid groups, International journal of computer applications, volume 31, number 1, 1-4, 2011, DOI: 10.5120/3786-5201
- . M.A.Alia, A.A.Tamimi, Q.N.A. Al-Allaf, Cryptography based authentication methods, Proceedings of the world congress on engineering and computer science, 2014, 199-204, available at http://www.iaeng.org/publication/WCECS2014/WCECS2 014_pp199-204.pdf.
- . B.Poettering, D.Stebila, Double authentication preventing signatures, European symposium on research in computer security (part of the lecture notes in computer science book series, (LNCS, volume 8712)), 2014, 436453, DOI: https://doi.org/10.1007/978-3-319-11203-9_25 .
- . C.Paar, J.Pelzl, Understanding cryptography-a textbook for students and practitioners, ISBN 978-3-64204101-3, 2010.
- . B.Schneier, Applied cryptography, protocols, algorithms and source code in C, second edition, Wiley, ISBN 978-1-119-09672-6, 1995.
- . D.R.Stinson, Cryptography-theory and practice, third edition, Chapman & Hall, CRC, ISBN 978-1-58488-5085, 2006.
- . V. Shukla, A. Chaturvedi, N. Srivastava, Authentication aspects of dynamic routing protocols: associated problem & proposed solution, International journal of recent technology and engineering, volume 8, issue 2, 2019, 412-419, DOI:10.35940/ijrte.B1503.078219
- . Cryptool portal, Cryptography for everybody, available at https://www.cryptool.org/en/download-ct1en/215.
- . V. Shukla, A. Mishra, S. Agarwal, A new one time password generation method for financial transactions with randomness analysis, Innovations in electrical and electronic engineering (part of the lecture notes in electrical engineering book series (LNEE, volume 661)), 2020, 713-720, DOI: https://doi.org/10.1007/978-981-154692-1_54
- . M. K. Lee, J. B. Kim, M. K. Franklin, Enhancing the security of personal identification numbers with three dimensional displays, Mobile information systems, volume 2016, article ID 8019830, 2016, 1-9, DOI: https://doi.org/10.1155/2016/8019830
- . P.Wang, Y.Kim, V.Kher, T.Kwon, Strengthening password-based authentication protocols against online dictionary attacks, International conference on applied cryptography and network security (part of the lecture notes in computer science book series, (volume 3531)), 2005, 17-32, DOI: https://doi.org/10.1007/11496137_2.
- . S.Chakrabarti, M.Singhal, Password-based authentication: preventing dictionary attacks, Computer (IEEE computer society), volume 40, issue 6, 2007, 68-74, DOI: 10.1109/MC.2007.216.
- . S.J.Abond, M.A.Al-Fayoumi, M.Al-Fayoumi, H.S.Jabbar, An efficient RSA public key encryption scheme, Fifth international conference on information technology: new generations, 2008, 127-130, DOI: 10.1109/ITNG.2008.199.
- . Crypto-IT, Kerckhoff’s principle, available at http://www.crypto-it.net/eng/theory/kerckhoffs.html.
- . H.C-Gibbs, W.Mu, D.Boneh, B.Ford, Ensuring highquality randomness in cryptographic key generation, ACM SIGSAC conference on computer & communications security, 2013, 685-696, DOI: 10.1145/2508859.2516680.
- . A.H.Lone, A.Khalique, Generalized RSA using 2k prime numbers with secure key generation, Security and communication networks, volume 9, issue 17, 2016, 44434450, DOI: https://doi.org/10.1002/sec.1619.
- . K. Marton, A. Suciu, I. Ignat, Randomness in digital cryptography: a survey, Romanian journal of information science and technology, volume 13, number 3, 2010, 219240, available at: http://romjist.ro/content/pdf/kmarton.pdf
- . A.Chaturvedi, N.Srivastava, V.Shukla, S.P.Tripathi, M.K.Misra, A secure zero knowledge authentication protocol for wireless (mobile) ad-hoc networks, International journal of computer applications, volume 128, number 2, 2015, 36-39, DOI:10.5120/ijca2015906437
- . A.Chaturvedi, N.Srivastava, V.Shukla, A secure wireless communication protocol using Diffie-Hellman key exchange, International journal of computer applications, volume 126, number 5, 2015, 35-38, DOI: 10.5120/ijca2015906060
- . V. Shukla, A. Chaturvedi, N. Srivastava, A new one time password mechanism for client-server applications, Journal of discrete mathematical sciences and cryptography, volume 22, issue 8, 2019, 1393-1406, DOI: 10.1080/09720529.2019.1692447
- . T. Lakshmanan, M. Muthusamy, A novel secure hash algorithm for public key digital signature schemes, The international Arab journal of information technology, volume 9, number 3, 2012, 262-267, available at: http://iajit.org/PDF/vol.9,no.3/2728-10.pdf
- . W. Fang, W. Chen, W. Zhang, J. Pei, W. Gao, G. Wang, Digital signature scheme for information nonrepudiation in blockchain: a state of the art review, Eurasip journal on wireless communications and networking, volume 2020, article number 56, 2020, 1-15, DOI: https://doi.org/10.1186/s13638-020-01665-w
- . R.F.Schaefer, A.Khisti, H.V.Poor, Secure broadcasting using independent secret keys, IEEE transactions on communications, volume 66, issue 2, 2017, 644-661, DOI: 10.1109/TCOMM.2017.2764892.
- . V.Shukla, A.Chaturvedi, N.Srivastava, A new secure authenticated key agreement scheme for wireless (mobile) communication in an EHR system using cryptography, Communications on applied electronics, volume 3, number 3, 2015, 16-21, DOI: 10.5120/cae2015651903
- . M.K. Misra, A. Chaturvedi, S.P. Tripathi, V. Shukla, A unique key sharing protocol among three users using non-commutative group for electronic health record system, Journal of discrete mathematical sciences and cryptography, volume 22, issue 8, 2019, 1435–1451, DOI: 10.1080/09720529.2019.1692450
- . V. Shukla, A.Mishra, A new sequential coding method for secure data communication, IEEE international conference on computing, power and communication technologies, 2020, 529-533, DOI:10.1109/GUCON48875.2020.9231252
- . M. A. Mughal, X. Luo, A. Ullah, S. Ullah, Z. Mahmood, A light weight digital signature based security scheme for human-centered internet of things, IEEE access, volume 6, 2018, 31630-31643, DOI:10.1109/ACCESS.2018.2844406
- . O. Tayan, M. N. Kabir, Y. M. Alginahi, A hybrid digital-signature and zero-watermarking approach for authentication and protection of sensitive electronic documents, The scientific world journal, volume 2014, article ID 514652, 2014, 1-14, DOI:https://doi.org/10.1155/2014/514652
- . U. Somani, K. Lakhani, M. Mundra, Implementing digital signature with RSA encryption algorithm to enhance the data security of cloud in cloud computing, First international conference on parallel, distributed and grid computing, 2010, 211-216, DOI:10.1109/PDGC.2010.5679895
- . P. Subpratatsavee, P. Kuacharoen, Animplementation of a paper based authentication using HC2D barcode and digital signature, Computer information systems and industrial management (part of the lecture notes in computer science book series (LNCS, volume 8838)), 2015, 592-601, DOI:https://doi.org/10.1007/978-3-662-45237-0_54
- . A. Dhivakar, D. Ravichandran, V. Dakha, Security and data compression in cloud computing using blobseer technique, Special conference issue, International journal of advanced networking and applications, 2015, 201-203, available at https://www.ijana.in/Special%20Issue/C36.pdf
- . M. Singh, V. Chaudhary, Loseless image compression having compression ratio higher than JPEG, Special conference issue, International journal of advanced networking and applications, 2015,135-139, available at https://www.ijana.in/Special%20Issue/C23.pdf
- A Secure GUI Method for Reliable Data Communication
Abstract Views :108 |
PDF Views:0
Authors
Affiliations
1 Rajiv Gandhi Technical University, Bhopal, Madhya Pradesh, IN
1 Rajiv Gandhi Technical University, Bhopal, Madhya Pradesh, IN
Source
International Journal of Advanced Networking and Applications, Vol 13, No 3 (2021), Pagination: 4979-4982Abstract
The need of secure and reliable data communication is getting increased day by day. Many algorithms and methods are being proposed by researchers in order to provide secure data communication. In the same context, in this paper, a new GUI (Graphical User Interface) based Peer to Peer (P2P) message transmission method is proposed. The method can provide transmission of encrypted data in a hidden way. The security analysis and advantages are also discussed to prove the utility of the proposed method. The proposed method utilizes the strength of cryptography and steganography and hence provides better security.Keywords
Cryptography, Data Communication, Encryption, Security, Steganography.References
- . A. J. Menezes, P. C. V. Oorschot, S. A. Vanstone, Handbook of applied cryptography, 5th edition, CRC Press Inc., USA, ISBN: 9780849385230, 2001.
- . W.Stallings, Cryptography and network security, principles and practices, seventh edition, Prentice Hall, ISBN-13:978-0134444284, ISBN-10:0134444280, 2005.
- . V. Shukla, A. Chaturvedi, N. Srivastava, Nanotechnology and cryptographic protocols: issues and possible solutions, Nanomaterials and energy, volume 8, issue 1, 2019, 1-6, DOI: 10.1680/jnaen.18.00006
- . V. Shukla, A. Chaturvedi, N. Srivastava, A secure stop and wait communication protocol for disturbed networks, Wireless personal communications, volume 110, 861-872, 2019, DOI: https://doi.org/10.1007/s11277019-06760-w
- . V. Shukla, N. Srivastava, A. Chaturvedi, A bit commitment signcryption protocol for wireless transport layer security (wtls), IEEE international conference on electrical, computer and electronics engineering , 2016, 83-86, DOI: 10.1109/UPCON.2016.7894629
- . N. Subramanian, O. Elharrouss, S.A. Maadeed, A. Bouridane, Image steganography: a review of the recent advances, IEEE access, volume 9, 2021, 23409-23423, DOI: 10.1109/ACCESS.2021.3053998
- . V. Shukla, A.Mishra, A new sequential coding method for secure data communication, IEEE international conference on computing, power and communication technologies, 2020, 529-533, DOI: 10.1109/GUCON48875.2020.9231252
- . P. Maniriho, T. Ahmad, Information hiding scheme for digital images using difference expansion and modulus function, Journal of king saud university - computer and information sciences, volume 31, issue 3, 2019, 335-347, DOI: https://doi.org/10.1016/j.jksuci.2018.01.011
- . A.A. Attaby, M.F.M.M. Ahmed, A.K. Alsammak, Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3, Ain Shams engineering journal, volume 9, issue 4, 2018, 19651974, DOI: https://doi.org/10.1016/j.asej.2017.02.003
- . A. Chaturvedi, V. Shukla, M.K. Misra, A random encoding method for secure data communication: an extension of sequential coding, Journal of discrete mathematical sciences and cryptography, volume 24, issue 5, 2021, 1189-1204, DOI: https://doi.org/10.1080/09720529.2021.1932902
- . M.S. Taha, M.S.M. Rahim, S.A. Lafta, M.M. Hashim, H.M. Alzuabidi, Combination of steganography and cryptography: a short survey, IOP conference series: materials science and engineering, volume 518, issue 5, 2019, 1-13, DOI: 10.1088/1757-899X/518/5/052003
- . A. Jan, S.A. Parah, M. Hussan, B.A. Malik, Double layer security using crypto-stego techniques: a comprehensive review, Health and Technology, 2021, 123, DOI: https://doi.org/10.1007/s12553-021-00602-1
- . S. Joshi, R. Mehra, GUI based approach for data encryption and decryption on MATLAB platform, International journal of computer applications, volume 181, number 16, 2018, 14-18, DOI: 10.5120/IJCA2018917758
- . V. Shukla, A. Chaturvedi, N. Srivastava, A new one time password mechanism for client-server applications, Journal of discrete mathematical sciences and cryptography, volume 22, 2019, 1393-1406, DOI: 10.1080/09720529.2019.1692447
- . J.J. Jaccard, S. Nepal, A survey of emerging threats in cybersecurity, Journal of computer and system sciences, volume 80, issue 5, 2014, 973-993, DOI: https://doi.org/10.1016/j.jcss.2014.02.005
- . A. Khraisat, I. Gondal, P. Vamplew, J. Kamruzzaman, Survey of intrusion detection systems: techniques, datasets and challenges, Cybersecurity, volume 2, article number 20, 2019, 1-22, DOI: https://doi.org/10.1186/s42400-019-0038-7
- . V.Shukla, A.Chaturvedi, N.Srivastava, A new secure authenticated key agreement scheme for wireless (mobile) communication in an EHR system using cryptography, Communications on applied electronics, volume 3, number 3, 2015, 16-21, DOI: 10.5120/cae2015651903
- . M.K. Misra, A. Chaturvedi, S.P. Tripathi, V. Shukla, A unique key sharing protocol among three users using non-commutative group for electronic health record system, Journal of discrete mathematical sciences and cryptography, volume 22, issue 8, 2019, 1435–1451, DOI: 10.1080/09720529.2019.1692450
- . A. Chaturvedi, N. Srivastava, V. Shukla, S.P. Tripathi, M.K. Misra, A secure zero knowledge authentication protocol for wireless (mobile) ad-hoc networks, International journal of computer applications, volume 128, number 2, 2015, 36-39, DOI: 10.5120/ijca2015906437
- . F. Aliyu, T. Sheltami, E.M. Shakshuki, A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing, Procedia computer science, volume 141, 2018, 24-31
- . M. Conti, N. Dragoni, V. Lesyk, A Survey of Man in the Middle Attacks, IEEE Communications Surveys & Tutorials ( Volume: 18, Issue: 3, thirdquarter 2016)
- . A.Chaturvedi, N.Srivastava, V.Shukla, A secure wireless communication protocol using Diffie-Hellman key exchange, International journal of computer applications, volume 126, number 5, 2015, 35-38, DOI: 10.5120/ijca2015906060
- . V. Shukla, A. Chaturvedi, M.K. Misra, On authentication schemes using polynomials over non commutative rings, Wireless personal communications, volume 118, issue 1, 2021, 1-9, DOI: https://doi.org/10.1007/s11277-020-08008-4
- . A. Mallik, A. Ahsan, M.M.Z. Shahadat, J.C. Tsou, Man-in-the-middle-attack: understanding in simple words, International journal of data and network science, volume 3, issue 2, 2019, 77-92, DOI: 10.5267/j.ijdns.2019.1.001
- . V. Shukla, M.K. Misra, A. Chaturvedi, A new authentication procedure for client-server applications using HMAC, Journal of discrete mathematical sciences and cryptography, volume 24, issue 5, 2021, 1241-1256, DOI: https://doi.org/10.1080/09720529.2021.1932908
- . V. Shukla, A. Chaturvedi, N. Srivastava, Authentication aspects of dynamic routing protocols: associated problem & proposed solution, International journal of recent technology and engineering, volume 8, issue 2, 2019, 412-419, DOI: 10.35940/ijrte.B1503.078219
- . V. Shukla, A. Mishra, S. Agarwal, A new one time password generation method for financial transactions with randomness analysis, Innovations in electrical and electronic engineering (Part of the lecture notes in electrical engineering book series (LNEE, volume 661)), 2020, 713-720, DOI: https://doi.org/10.1007/978-981-15-4692-1_54
- . K. Nishat, B.R. Purushothama, Group-oriented encryption for dynamic groups with constant rekeying cost, Security and communication networks, volume 9, 2016, 4120-4137, DOI: 10.1002/sec.1593
- . M.T. Dong, H. Xu, Group Key Management Scheme for Multicast Communication Fog Computing Networks, Processes, volume 8, issue 10, 2020, 1-20, DOI: https://doi.org/10.3390/pr8101300
- . N. Hegde, S.S. Manvi, Secure group key management scheme for dynamic vehicular cloud computing, International journal of advanced networking and applications, volume 13, issue 1, 2021, 4821-4826, DOI: 10.35444/IJANA.2021.13103.
- Design and Implementation of Privacy and Security System in Social Media
Abstract Views :112 |
PDF Views:0
Authors
Affiliations
1 Research Scholar, Department of Computer Science & Engg, Nims University Rajasthan, Jaipur, IN
2 Professor, Department of Computer Science & Engg, Nims University Rajasthan, Jaipur, IN
3 Ex-Professor, Department of Information Technology, VIPS, New Delhi, IN
1 Research Scholar, Department of Computer Science & Engg, Nims University Rajasthan, Jaipur, IN
2 Professor, Department of Computer Science & Engg, Nims University Rajasthan, Jaipur, IN
3 Ex-Professor, Department of Information Technology, VIPS, New Delhi, IN
Source
International Journal of Advanced Networking and Applications, Vol 13, No 4 (2022), Pagination: 5081-5088Abstract
Privacy and security are the main concern of any social media networking sites such as Facebook, Twitter Instagram and LinkedIn etc. The primary purpose of these sites is to allow people to share interests, activities, real-life connections. Nowadays social networking sites are the main source of communication and on the other hand these sites are the peak targets for misusing the data and information. This is the fact that the maximum numbers of users are not aware about cyber threats and their lack of knowledge leads to further increase in cyber-crimes is a major challenge. Users should aware in the concerned of security and privacy during creating the account on social media, to read the instruction and follow it. There is some setting in social media platform to secure the message and share to only authorize users. Various governments and businesses are taking a variety of steps to combat cybercrime. Despite many steps, cyber security remains a major issue for many people. This paper focuses on the issues that cyber security faces in the modern era. It also covers the most up-to-date information on cyber security tactics, ethics, and trends that are transforming the face of cyber security.Keywords
Data privacy, cyber security, cyber crime, cyber ethics, social media, cloud computing.References
- Aimeur, E., Gambs, S., & Ho, A. (2010). Towards a Privacy-Enhanced Social Networking Site. International Conference on Availability, Reliability and Security. pp. 172-179
- Labs, V. (2014). Majority of Global 2000 Organizations Have Not Remediated Heartbleed, Remain Vulnerable to Cyber Attacks. Venafi Labs Q3 Heartbleed Threat Research Analysis.
- Walker, D. (2014). Experts take inventory of Sony Pictures data leak, potential costs. Available at: http://www.scmagazine.com/experts-takeinventoryof-sony-pictures-data-leak-potentialcosts/ article/386991/
- Kitchenham, B. (2004). Procedures for performing systematic reviews. Joint Technical Report, 33(2004), pp. 1-26.
- Das, Rituparna, and Mayank Patel. "Cyber Security for Social Networking Sites: Issues, Challenges And Solutions." International Journal for Research in Applied Science & Engineering Technology (IJRASET) 5.4,833-838 (2017).
- Jang-Jaccard, Julian, and Surya Nepal. "A survey of emerging threats in cybersecurity." Journal of Computer and System Sciences 80.5 (2014): 973993.
- Jabee, Roshan, and M. Afshar Alam. "Issues and challenges of cyber security for social networking sites (Facebook)." International Journal of Computer Applications 144.3 (2016): 36-40.
- Soumya, T. R., and S. Revathy. "Survey on threats in online social media." 2018 International Conference on Communication and Signal Processing (ICCSP). IEEE, 2018.
- El Mrabet, Z., Kaabouch, N., El Ghazi, H., & El Ghazi, H. (2018). “Cyber-security in smart grid: Survey and challenges.” Computers & Electrical Engineering, 67, 469-482.
- Senthilkumar, K., &Easwaramoorthy, S. (2017, November). “A Survey on Cyber Security awareness among college students in Tamil Nadu.” In IOP Conference Series Materials Science and Engineering (Vol. 263).
- Kirichenko, L., Radivilova, T., & Carlsson, A. (2018). “Detecting cyber threats through social network analysis: short survey. “ arXiv preprint arXiv:1805.06680.
- Kayes, I., &Iamnitchi, A. (2017). “Privacy and security in online social networks: A survey.” Online Social Networks and Media, 3, 1-21.
- Fire, M., Goldschmidt, R., &Elovici, Y. (2014). “Online social networks: threats and solutions.” IEEE Communications Surveys & Tutorials, 16(4), 2019-2036.
- Albladi, S. M., & Weir, G. R. (2020). “Predicting individuals’ vulnerability to social engineering in social networks.” Cyber security, 3(1), 1-19.
- Senthil Kumar, N., Saravanakumar, K., & Deepa, K. (2016).” On privacy and security in social media–a comprehensive study.” Procedia Computer Science, 78, 114-119.
- Gharibi, Wajeb, and MahaShaabi. "Cyber threats in social networking websites." arXiv preprint arXiv:1202.2420 (2012).
- Kumar, Sunil, and Vikash Somani. "Social Media Security Risks, Cyber Threats And Risks Prevention And Mitigation Techniques." International Journal of Advance Research in Computer Science and Management 4.4 (2018): 125-129.
- Al Mushayt, Omar Saeed. "Threats and antithreats strategies for social networking websites." International Journal of Computer Networks & Communications (IJCNC) Vol 5 (2013).
- Canongia, Claudia, and Raphael Mandarino. "Cyber security: The new challenge of the information society." Handbook of Research on Business Social Networking: Organizational, Managerial, and Technological Dimensions. IGI Global, 2012. 165-184.
- Zanero, S, D Keromytis , “ Security and privacy measurements in social networks”. Available:http://nsl.cs.columbia.edu/papers/2014/l essons.badgers14.pdf [Accessed: 25 July 2016]D Gunter , Solomon S, “The Danger of Data Exfiltration over Social Media Sites” , Western International University, Available: https://media.blackhat.com/bh-us-12/Briefings/Gunter/BH_US_12_Gunter_Sonya_S
- NSCat_WP.pdf [Accessed: 19 July 2016
- http://www.cybercitizenship.org/ethics/.