Search Results - (( web application using algorithm ) OR ( phone applications security algorithm ))
Search alternatives:
- phone applications »
- web application »
- using algorithm »
-
1
Secure mobile AES encryptor (SMAE)
Published 2016“…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…Increasing use of mobile phones to access web applications increases the threat of cross-site scripting attacks on mobile phones. …”
Get full text
Get full text
Get full text
Article -
3
Malware visualizer: A web apps malware family classification with machine learning
Published 2021“…The web apps is developed using Python with help of Streamlit with is a Python library for building datadriven web apps. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…Currently, normal SMS using GSM communication is not secured and safe enough. One of the solutions is to have a security application implemented in mobile phone device. …”
Get full text
Get full text
Conference or Workshop Item -
6
Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni
Published 2013“…This project focuses on steganography and cryptography. This application uses two levels of securities that make the information more secure and bring difficult to unauthorized party get the information. …”
Get full text
Get full text
Thesis -
7
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
8
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
Published 2010“…Short message service (SMS) is a very popular and easy to use communications technology for mobile phone devices. Originally, this service was not designed to transmit secured data, so the security was not an important issue during its design. …”
Get full text
Get full text
Get full text
Article -
9
The child tracker using location awareness / Muhammad Idham Amdan
Published 2017“…In this paper, the aim of proposed conceptual smartphone tracker framework is to provide mobile phone security and to locate ability of device in form of mobile application.…”
Get full text
Get full text
Thesis -
10
Secure annihilation of out-of-band authorization for online transactions
Published 2018“…Methods/Statistical Analysis: The algorithm presented in this paper provides an infinite as well as forward One-time password (OTP) generation mechanism employing two Secure Hash Algorithms viz. …”
Get full text
Get full text
Get full text
Article -
11
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
12
-
13
Development of portable automatic number plate recognition system on android mobile phone
Published 2013“…Thus, the significance efforts are to find suitable and adaptive algorithm for number plate recognition under mobile phone. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Development of portable automatic number plate recognition system on android mobile phone
Published 2013“…Significance efforts are being explored to find suitable and adaptive algorithm for implementation of ANPR on mobile phone. …”
Get full text
Get full text
Get full text
Article -
15
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
16
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…The technology lends itself well to a variety of uses and applications, including security access control for cell phones (to eliminate cell phone fraud), ATM manufacturers (to eliminate pin # fraud) and automobile manufacturers (to dramatically reduce theft and carjacking). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Smart Home Security Using Facial Authentication
Published 2024“…The proposed application allows users to keep track of the happenings at their homes using mobile phones, Tablets, or PCs. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Text Extraction Algorithm for Web Text Classification
Published 2010“…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
Get full text
Get full text
Get full text
Thesis
