1 |
Steven J . Presence technology: more than just instant messaging. IEEE Internet Computing, 2003,7(5)
|
2 |
Cherry S M . IM means business. IEEE Spectrum, 2002,39(11)
|
3 |
Licari Joe . Best practices for instant messaging in business. Network Security, 2005(5):4~7
|
4 |
Carvey Harlan . Instant messaging investigations on a live Windows XP system. Digital Investigation, 2004,1(4)
|
5 |
Instant messaging vulnerability. Network Security, 2002
|
6 |
McClea M , Yen D C , Huang A . An analytical study towards the devel-opment of a standardized IM application. Computer Standards & Inter-faces, 2004,26(4)
|
7 |
Mourad Debbabi , Mahfuzur Rahman . The war of presence and instant messaging: right protocols and APIs.In: Proceedings of Consumer Communications and Networking Conference(CCNC), Las Vegas,Neva-da, January 2004
|
8 |
Ericsson, Motorola, Nokia. Wireless village system architecture model version 1.1,
|
9 |
RFC2778.A model for presence and instant messaging. IETF, Feb 2000
|
10 |
RFC2779.Instant messaging/presence protocol. IETF, Feb 2000
|
11 |
司端锋, 汉新华, 龙琴 等. SIP标准中的核心技术与研究进展. 软件学报, 2005,16(2)
|
12 |
RFC3329. Security mechanism agreement for the session initiation pro-tocol(SIP). IETF, Jan 2003
|
13 |
Summary of XMPP,
|
14 |
RFC3920.Extensible messaging and presence protocol(XMPP)core. IETF, Oct 2004
|
15 |
RFC 3921. XMPP extensions for basic instant messaging and presence. IETF
|
16 |
RFC 3923. End-to-end signing and object encryption for the extensible messaging and presence protocol(XMPP). Jabber/IETF, Oct 2004
|
17 |
Reuters IM service shut down by worm. Computer Fraud & Security, 2005(4)
|
18 |
Horst Joepen . Instant messaging-enabler or threat? Info Security Today, 2004,2(1)
|
19 |
John Stone Sarah Merrion . Symantec instant messaging or instant head-ache?Enterprise Search, 2004,2(2)
|
20 |
Semantic. Securing Instant Messaging,
|
21 |
Leavitt Neal . Instant messaging: a new target for hackers. Leavitt Com-munications, 2005
|
22 |
卿斯汉 . 安全协议20年研究进展. 软件学报, 2003,14(10)
|
23 |
Lina Zhou . An empirical investigation of deception behaviorin instant messaging. IEEE Transaction on professional communication, 2005,48(2)
|
24 |
RFC 2222. Simple authentication and security layer (SASL). IETF, Oct 1997
|
25 |
Liberty alliance identity architecture,
|
26 |
Bob Atkinson . Specification: web services security (WS-Security),
|
27 |
Kurt Seifried . The end of SSL and SSH,
|
28 |
Ali Aydin Selcuk , Ersin Uzun , Mark Resat Pariente . A reputation-based trust management system for P2P networks.In: Proceedings of 2004 IEEE International Symposium on Cluster Computing and the Grid, Chicago, USA, April 2004
|
29 |
Fong A C M , Hui S C , Lau C T . Towards an open protocol for secure online presence notification A C M. Computer Standards & Interfaces, 2001,23(4)
|
30 |
William Yeager , Joseph Williams . Secure peer-to-peer networking: the JXTA example.In: IEEE IT Pro, March 2002
|
31 |
Hiroaki Kikuchi , Minako Tada , Shohachiro Nakanishi . Secure instant messaging protocol preserving confidentiality against administrator.In: Proceedings of the AINA'04, Fukuoka,Japan, March 2004
|