Search Results - (( _ application system algorithm ) OR ( mobile application security algorithm ))*

Search alternatives:

Refine Results
  1. 1
  2. 2

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…This application will focus more on the user of the Android operating systems based mobile phone users. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail by Che Ismail, Suhaila

    Published 1998
    “…Therefore, a thorough research is to be accomplished in order to produce the mobile IP to the extent of the security features and the algorithm.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
    Get full text
    Get full text
    Student Project
  5. 5

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…SANAsms or Short Messaging System (SMS) Encryption System is as application on mobile phone that enables to send, receive and store encrypted text messages. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    RSA algorithm performance in short messaging system exchange environment by Mohamad Tahir, Hatim, Madi, Tamer N. N., Husin, Mohd Zabidin, Puteh, Nurnasran

    Published 2011
    “…This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm by Arezoumand, Reza

    Published 2015
    “…Employing a multi-robot system and path planning with spanning tree algorithm is a strategy for speeding up sensor node deployment. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Lightweight Cryptography Techniques for MHealth Cybersecurity by Shahbodin, F, Azni, AH, Ali, T, Mohd, CKNCK

    Published 2024
    “…A new integration of wireless communication technologies into the mobile heath system also known as mHealth has instigated a momentous research interest in the field of mobile security. mHealth systems are unique in terms of characteristics, challenges, architecture, and applications. …”
    Proceedings Paper
  16. 16
  17. 17
  18. 18

    Simulation of handoff algorithm for NDN producer’s mobility by Ahmed, Muhammed Zaharadeen, Hassan Abdalla Hashim, Aisha, Mohd. Ramli, Huda Adibah, Khalifa, Othman Omran, Alkali, Abdulkadir Hamidu, Adamu, Zainab Mohammed

    Published 2020
    “…In the results, we present video application throughput and the link throughput of link 1, link 2 and link 7 and comprehend that, efficiency and seamless mobility is realized using video application as compared to link throughout. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS by Azlina, Ahmadi Julaihi, Ping Ping, Tan, Fateen Afeefa, Md Nor

    Published 2022
    “…This enhanced entrance security allows the students to put in a request for the visitor by giving the visitor’s to the security officer for approval. This proposed system is an Android-based application developed using the Waterfall methodology. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  20. 20