3 research outputs found

    Design of Secure Chatting Application with End to End Encryption for Android Platform

    Get PDF
    In this paper, a secure chatting application with end to end encryption for smart phones that used the android OS has beenproposed. This is achieved by the use of public key cryptography techniques. The proposed application used the Elliptic Curve DiffieHellman Key Exchange (ECDH) algorithm to generate the key pair and exchange to produce the shared key that will be used for theencryption of data by symmetric algorithms. The proposed Application allows the users to communicate via text messages, voicemessages and photos. For the text message security the standard AES algorithm with a 128 bit key are used. The generated key (160 bit)minimized to 128 bit length by selecting the first 128 bit of the generated key in order to be used by the AES algorithm. For the voice andimage security processes the proposed application used the symmetric algorithm RC4 for this purpose

    Mobile Instant Messaging Evidence in Criminal Trials

    Get PDF
    Mobile instant messaging, such as text messages, are a pervasive aspect of everyday life. The characteristics of the modern mobile instant messaging application, especially in comparison with other forms of more traditional electronic communication platforms, such as e-mail, text messaging, or computer-based instant messaging program, present a variety of evidentiary issues in trial. To be relevant, mobile instant messaging evidence must be connected to a genuine issue at trial and not too attenuated from it. Authentication is also very important in determining whether it may be considered a non-hearsay statement. Although often otherwise admissible, mobile instant messaging evidence may still be inadmissible if its probative value is substantially outweighed by the risk of unfair prejudice or other concerns of fairness. This comment examines the evidentiary issues surrounding the admissibility of the mobile instant messaging evidence in criminal trials, with particular emphases on the issues of authentication and the best evidence doctrine

    Deliberation in Mobile Messaging Application: A Case in Hong Kong

    Get PDF
    Considering the increasing penetration of Internet and mobile technologies, we can foresee that more online debates and political discussions, such as online deliberations, will occur in the future. However, prior research does not illustrate or provide empirical evidence to support steps that that online deliberation should take. To address this gap, we conduct a case study on Project ThunderGo, an online deliberation campaign related to the 2016 Hong Kong Legislative Election. Via analyzing data obtained from their deliberation groups, the relevant news articles, and the election results, we establish a four-stage building, engineering, arriving, and reaching (BEAR) model of online deliberation and provide some practical implications for future deliberation host. The model and implications articulate ICT’s role in addressing complicated and multi-facet social problems
    corecore