Describes the methods of the organization secure messaging between mobile clients. Regarded the use of asymmetric encryption centralized network over the Internet. Lists relevant means of implementation software.
-
D.A. Kosov, R.Yu. Shlaustas of the TECHNIQUE of CONSTRUCTION WIRELESS ZASHCHISHCHEN-NYH of NETWORKS.//Information technologies and problems of mathematical modeling of difficult systems. Issue 15. Irkutsk: ИрГУПС, 2016. page 72-78.
2. Rivest R., Shamir A., Adleman L. A method for obtaining digital signatures and public-key cryp-tosystems // Commun. ACM New York City: ACM, 1978. Vol. 21, Iss. 2. P. 120–126. — ISSN 0001-0782; 1557-7317
3. [Electronic resource] URL: https://nodejs.org/en/(date of the address: 23.05.2017).
4. [Electronic resource] URL: https://www.sqlite.org/(date of the address: 23.05.2017).
5. [Electronic resource] URL: https://socket.io/(date of the address: 23.05.2017).
6. [Electronic resource] URL: https://cordova.apache.org/(date of the address: 23.05.2017).
7. [Electronic resource] URL: https://openpgpjs.org/(date of the address: 23.05.2017).
8. [Electronic resource] URL: https://ru.vuejs.org/(date of the address: 23.05.2017).
9. [Electronic resource] URL: http://phonon.quarkdev.com/(date of the address: 23.05.2017).