References
[1]. Bolton, A., Murray, M., & Fluker, J. (2017, January).
Transforming the workplace: Unified communications &
collaboration usage patterns in a large automotive
manufacturer. In Proceedings of the 50th Hawaii
International Conference on System Sciences (pp. 5470-
5479).
[2]. Qin, H. B., & Xu, X. (2015, October). Solution to secure
instant messaging based on hardware encryption. In 2015,
IEEE 16th International Conference on Communication
Technology (ICCT) (pp. 844-847). IEEE. https://doi.org/10.
1109/ICCT.2015.7399959
[3]. Rodrigues, G. A. P., Albuquerque, R. D. O., Alves, G. D.
O., De Mendonça, F. L. L., Giozza, W. F., De Sousa, R. T., &
Orozco, A. L. S. (2020). Securing instant messages with
hardware-based cryptography and authentication in browser extension. IEEE Access, 8, 95137-95152. https://
doi.org/10.1109/ACCESS.2020.2993774
[4]. Schoen, I., & Boberski, M. (2003). Secure PKI proxy and
method for instant messaging clients (U. S. Patent
Application 10/133, 202). US Patent and Trademark Office.
Retrieved from https://patents.google.com/patent/Us2003
0204741A1/en
[5]. Stallings, W. (2006). Cryptography and network
security, (4th Ed.). Pearson Education India. Retrieved from
https://uru.ac.in/uruonlinelibrary/Cyber_Security/Cryptogra
phy_and_Network_Security.pdf
[6]. The Radicati Group (2015). Instant Messaging Statistics Report, 2015-2019. CA, USA: The Radicati Group. Retrieved
from https://www.radicati.com/wp/wp-content/uploads/
2015/02/Instant_Messaging_Statistics_Report_2015-2019_
Executive_Summary.pdf
[7]. Wang, S. (2014). The design and implementation of the
Android oriented client for "Mixun"- A secure
communication software [Postgraduate Dissertation].
Beijing Jiaotong University, China.
[ 8]. Yang, H., Zhao, W. T., & Zhang, N. Q. (2015). Design and
implementation of independent controllable instant
message communication system based on Android.
Electronic Design Engineering, 23(6), 67-70.