Skip to main content

A Secure and Efficient Communication Tool

  • Chapter
  • First Online:
Digital Marketplaces Unleashed

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. D. Leonard-Barton, “Wellsprings of knowledge: Building and sustaining the sources of innovation,” University of Illinois at Urbana-Champaign’s Academy for Entrepreneurial Leadership Historical Research Reference in Entrepreneurship, 1995.

    Google Scholar 

  2. R. e. a. Thorpe, “Using knowledge within small and medium-sized firms: A systematic review of the evidence,” International Journal of Management Reviews, pp. 257–281, 2005.

    Google Scholar 

  3. The Radicati Group, Inc., “Email Statistics Report, 2015–2019,” Palo Alto, CA, USA, 2015.

    Google Scholar 

  4. M. E. J. Newman, S. Forrest und J. Balthrop, “Email networks and the spread of computer viruses,” Phys. Rev. E, p. 4, 09 2002.

    Google Scholar 

  5. Z. Durumeric, D. Adrian, A. Mirian, J. Kasten, E. Bursztein, N. Lidzborski, K. Thomas, V. Eranti, M. Bailey und J. A. Halderman, “Neither snow nor rain nor mitm …: An empirical analysis of email delivery security,” Proceedings of the 2015 ACM Conference on Internet Measurement Conference, pp. 27–39, 2015.

    Google Scholar 

  6. P. Zimmermann, “Phil Zimmermann – Why I Wrote PGP,” 06 1991. [Online]. Available: https://www.philzimmermann.com/EN/essays/WhyIWrotePGP.html. [Accessed 17 08 2016].

    Google Scholar 

  7. P. Hoffman, “Smtp service extension for secure SMTP over TLS,” 1998.

    Google Scholar 

  8. S. Gandel, “Lloyd’s CEO: Cyber attacks cost companies $400 billion every year,” Fortune, 23 01 2015. [Online]. Available: http://fortune.com/2015/01/23/cyber-attack-insurance-lloyds/. [Accessed 21 10 2016].

    Google Scholar 

  9. T. Van Vleck, “The History of Electronic Mail,” 01 02 2001. [Online]. Available: http://www.multicians.org/thvv/mail-history.html. [Accessed 19 08 2016].

    Google Scholar 

  10. ICQ LLC, “ICQ,” 1998–2016. [Online]. Available: https://icq.com/. [Accessed 19 08 2016].

  11. AOL Inc., “AIM,” 2016. [Online]. Available: https://www.aim.com/. [Accessed 19 08 2016].

    Google Scholar 

  12. WhatsApp Inc., “WhatsApp Blog,” 01 02 2016. [Online]. Available: https://blog.whatsapp.com/616/Eine-Milliarde. [Accessed 31 08 2016].

    Google Scholar 

  13. E. Kim, “WhatsApp’s Insane Growth Continues: 100 Million New Users in 4 Months,” Business Insider INDIA, 07 01 2015. [Online]. Available: http://www.businessinsider.in/WhatsApps-Insane-Growth-Continues-100-Million-New-Users-in-4-Months/articleshow/45786867.cms. [Accessed 31 08 2016].

    Google Scholar 

  14. J. B. Graham, “Impacts of Text Messaging on Adolescents’ Communication Skills: School Social Workers’ Perceptions,” 2013.

    Google Scholar 

  15. Slack Technologies, “A little update about a lot of people using Slack,” 25 05 2016. [Online]. Available: https://slackhq.com/a-little-update-about-a-lot-of-people-using-slack-f16c5b331647. [Accessed 26 08 2016].

    Google Scholar 

  16. Slack Technologies, “How can Slack help my team?,” [Online]. Available: https://slack.com/results. [Accessed 26 08 2016].

  17. Slack Technologies, “Slack Policies,” 01 12 2015. [Online]. Available: https://slack.com/security-practices. [Accessed 30 08 2016].

    Google Scholar 

  18. T. Frosch und C. e. a. Mainka, “Horst Görtz Institut for IT-Security, Ruhr University Bochum,” 2014. [Online]. Available: eprint.iacr.org/2014/904.pdf. [Accessed 31 08 2016].

    Google Scholar 

  19. J. Poterba, “Economic Implications of Demographic Change,” Business Economics, Bd. 51, Nr. 1, pp. 3–7, 2016.

    Article  Google Scholar 

  20. M. Cagnazzo, M. Hertlein und N. Pohlmann, “An Usable Applicationan for Authentication, Communication and Access Management in the Internet Of Things,” Communications in Computer and Information Science, 2016.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matteo Cagnazzo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer-Verlag GmbH Germany

About this chapter

Cite this chapter

Cagnazzo, M., Wegner, P., Pohlmann, N. (2018). A Secure and Efficient Communication Tool. In: Linnhoff-Popien, C., Schneider, R., Zaddach, M. (eds) Digital Marketplaces Unleashed. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49275-8_69

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-49275-8_69

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-49274-1

  • Online ISBN: 978-3-662-49275-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics