The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Caller ID has been used to tell the recipient who is calling before answering the call. In fact, nowadays using just Caller ID is not enough to proof the real caller since there are several ways to manipulate the caller identity. There are number of solutions to proof the caller e.g. using Time base, SMS base, or hardware. Even using DSA and CA, it can lead to data leak or inconsistent verification...
The usability of smartphones has been changing our living style significantly. Along with great convenience and efficiency, there are new challenges in protecting the data carried in these devices. Thus, nowadays the mobile data security has become a buzz word among every mobile user in real time. The key security feature for protecting data on the mobile device is encryption system. There are several...
Mobile device and its applications have revolutionized the way we store and share data. It is becoming a warehouse of users personal information. Unluckily, most of these data are stored in an unencrypted format, prone to security threats. In this paper, we propose a lightweight, computationally efficient protocol, called CLOAK, for the mobile device. CLOAK is based on stream cipher and takes the...
The rapid production, huge increasing features and capabilities of mobile sensing devices such as smart phones increases usage of variety of mobile sensing application. As WSN is having huge coverage area, data is collected from multiple mobile users. For this huge amount of data, statistics needs to be periodically updated for applications such as population monitoring, temperature monitoring and...
Parallel computing on cloud infrastructure had gained tremendous attention and popularity in recent years. In this paper, we propose a new technique to encrypt an image for secure image transmission and parallel decryption using cloud resources. The encoding of the image is done using the FFT conjugate complex property and private random phase key value shared between sender and receiver. First, using...
Cloud computing is getting more popular in the field of computer science because of its reliability in storing and assessing data remotely. In the presence scenario it is very biter to have mobile devices as an interface between user and server, to access and store data for one's need. Mobile technology in cloud computing is helps users to operate on the data for any of the application for their organization...
In the present paper the authors have introduced a new combined cryptographic method called TTJSA. Nath et al. have already developed some symmetric key methods. In the present work the authors have used two methods MSA and NJJSAA which were developed by Nath et al. and have developed a new algorithm, generalized modified Vernam Cipher Method. The above three methods are applied in random order on...
Mobile Computing devices are increasing enormously in all fields of communication, which aims to focus on secure transfer of information. In order to provide authentication, message integrity and secure message transfer, developers need to access the cryptographic packages. The objective of this paper is to analyze and compare various algorithms discussed in Bouncy Castle Toolkit. Analysis was performed...
Nowadays, short message service (SMS) is faced with various security threats. Thus, the fields of high confidentiality(e.g., mobile E-commerce) require a higher level of security protection on SMS. Secure communication in incredible mobile network has very important significance. This paper presents a high security communication protocol for SMS. Through authentication, decryption and integrity protection,...
As one of the most popular mobile communication technologies, short message service (SMS) is faced with various security threats. Thus, the fields of high confidentiality (e.g., mobile E-commerce) require a higher level of security protection on SMS. Secure communication in incredible mobile network has very important significance. This paper presents a high security framework for SMS. Through authentication,...
Traditionally, it has been difficult to deploy mobile Java security in mass market mobile devices primarily due to size and speed constraints. NTRU, a relatively new public key cryptosystem based on the shortest vector problem in a lattice, with many advantages compared with other cryptosystems, such as high speed and low memory use, provides the possibility to overcome the constraints. This paper...
Mobile relay stations (RSs) provide broadband wireless access (BWA) networks with additional mobility, which extends network coverage and advances dynamic networking and ubiquitous computing. However, there are many unresolved security vulnerabilities in the current IEEE 802.16 standard, such as BS/RS spoofing. Additional measures are needed to ensure that each component in the network is a trusted...
The focus of this paper is on access security aspects of 3G-WLAN interworking. Firstly, the authentication entities which do not rely on the concrete heterogeneous network are abstracted by analyzing 3G-WLAN multi-kind heterogeneous network model. And then a common authentication model is established and a novel access authentication and key agreement scheme combined elliptic curve cryptographic techniques...
With the widely applications of mobile communication networks, end-to-end secure voice has become a very important research issue and has attracted many people??s interests. A simple and effective method for end-to-end secure communication is to encrypt speech signal at user ends. But the use of encryption techniques leads to a hard problem that encrypted speech data can not be directly transmitted...
This paper deals with a theme of securing communication in GSM networks. At the beginning there are defined some important terms, followed by an overview of GSM security, including encryption/decryption and some limitations. At the end there are described some solutions of end-to-end voice call encryption.
In this paper, we introduce a secure mobile payment model suitable for macro transactions that compromise cost, simplicity, security, and performance of transaction, with minimum number of cryptography key usages, and less encryption/decryption operations compared to other models. This model can use symmetric and asymmetric cryptography without the need of trusted 3rd parties or even PKI complexity...
Privacy is needed in adhoc networks. A secured on demand position based private routing algorithm is proposed for communication anonymity and provide a security in mobile adhoc network. Here we use cryptography algorithm for providing security to prevent message hacking information from internal & external attackers. The position information of nodes is drawn by GPS (global positioning system)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.