Search Results - (( mobile applications security algorithm ) OR ( based application using algorithms ))*
Search alternatives:
- mobile applications »
- based application »
- using algorithms »
-
1
Secure mobile AES encryptor (SMAE)
Published 2016“…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
Get full text
Get full text
Undergraduates Project Papers -
2
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
3
Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi
Published 2019“…This paper analyzes how information sent through mobile messaging application is being secured. Nowadays, people are more likely to communicate with each other through mobile application. …”
Get full text
Get full text
Student Project -
4
-
5
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
6
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
7
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008Get full text
Get full text
Conference or Workshop Item -
8
-
9
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
Proceedings Paper -
10
Controlling algorithm for energy consumption of radio bandwidth to manage coverage area problem
Published 2024Conference Paper -
11
Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm
Published 2015“…Developing an exploration algorithm based on spanning tree is the main contribution. …”
Get full text
Get full text
Thesis -
12
The child tracker using location awareness / Muhammad Idham Amdan
Published 2017“…In this paper, the aim of proposed conceptual smartphone tracker framework is to provide mobile phone security and to locate ability of device in form of mobile application.…”
Get full text
Get full text
Thesis -
13
-
14
Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni
Published 2013“…This project focuses on steganography and cryptography. This application uses two levels of securities that make the information more secure and bring difficult to unauthorized party get the information. …”
Get full text
Get full text
Thesis -
15
A new mobile malware classification for call log exploitation
Published 2024Subjects:journal::journal article -
16
-
17
Lao-3d: A Symmetric Lightweight Block Cipher Based on 3d Permutation for Mobile Encryption Application
Published 2024journal::journal article -
18
Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS
Published 2022“…This proposed system is an Android-based application developed using the Waterfall methodology. …”
Get full text
Get full text
Get full text
Proceeding -
19
Mobile agent based multi-layer security framework for cloud data centers
Published 2015“…Objective:This paper proposes a new mobile agent based cloud security framework comprising four different security and authentication layers to establish the trust relationship between two entities before using cloud services. …”
Get full text
Get full text
Get full text
Article -
20
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis
