Search Results - (( _ application system algorithm ) OR ( mobile application security algorithm ))*
Search alternatives:
- system algorithm »
-
1
Analysis of confidentiality algorithms in different mobile generations
Published 2017Get full text
Get full text
Get full text
Proceeding Paper -
2
Secure mobile AES encryptor (SMAE)
Published 2016“…This application will focus more on the user of the Android operating systems based mobile phone users. …”
Get full text
Get full text
Undergraduates Project Papers -
3
A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail
Published 1998“…Therefore, a thorough research is to be accomplished in order to produce the mobile IP to the extent of the security features and the algorithm.…”
Get full text
Get full text
Thesis -
4
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
5
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…SANAsms or Short Messaging System (SMS) Encryption System is as application on mobile phone that enables to send, receive and store encrypted text messages. …”
Get full text
Get full text
Conference or Workshop Item -
6
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
7
RSA algorithm performance in short messaging system exchange environment
Published 2011“…This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
10
-
11
Comparative study of some symmetric ciphers in mobile systems
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
12
Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm
Published 2015“…Employing a multi-robot system and path planning with spanning tree algorithm is a strategy for speeding up sensor node deployment. …”
Get full text
Get full text
Thesis -
13
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
14
Hybrid Energy Encryption of Wireless Power Transfer Algorithm for Near Field Range
Published 2024thesis::doctoral thesis -
15
Lightweight Cryptography Techniques for MHealth Cybersecurity
Published 2024“…A new integration of wireless communication technologies into the mobile heath system also known as mHealth has instigated a momentous research interest in the field of mobile security. mHealth systems are unique in terms of characteristics, challenges, architecture, and applications. …”
Proceedings Paper -
16
The child tracker using location awareness / Muhammad Idham Amdan
Published 2017Subjects: Get full text
Get full text
Thesis -
17
A new mobile malware classification for call log exploitation
Published 2024Subjects:journal::journal article -
18
Simulation of handoff algorithm for NDN producer’s mobility
Published 2020“…In the results, we present video application throughput and the link throughput of link 1, link 2 and link 7 and comprehend that, efficiency and seamless mobility is realized using video application as compared to link throughout. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS
Published 2022“…This enhanced entrance security allows the students to put in a request for the visitor by giving the visitor’s to the security officer for approval. This proposed system is an Android-based application developed using the Waterfall methodology. …”
Get full text
Get full text
Get full text
Proceeding -
20
