RESEARCH PAPERS

security in mobile communication research papers



Security in public mobile communication networks
free download

Summary Starting with the strongest data protection and security requirements for public radio networks known to us, the lack of data security in existing and planned public mobile telecommunication systems is shown. Possible solutions are demonstrated to show how 

Security and communication in mobile object systems
free download

The rapid growth of computer networks has created an opportunity for developing mas- sively distributed computer systems. Such systems will likely consist of loose commu- nities of heterogeneous machines rtmning different operating systems with different se- curity policies. The 

Ensuring the security and privacy of information in mobile health-care communication systems
free download

Before the application of information and communication technology (ICT) in health-care delivery systems, some of the problems faced were the incorrect recording of diagnoses, unavailability of patient information, delays in accessing the information, space limitations 

Security functions in mobile communication systems
free download

 Page 33. Intelligent Network Core Network Access Network Anonymous Network Security of mobile communication • Conclusion – Protection of locations can be technically realized – However, there is a demand for legal enforcement • More information 

Wireless Communication Technologies for Mobile Healthcare Applications: Experiences and Evaluation of Security Related Issues
free download

The healthcare environment is currently changing with increased emphasis on prevention and early detection of disease, primary care, intermittent healthcare services provided by medical centers of excellence, home care, and continuity of care. This requires the provision of 

Perceptions of security and privacy when using mobile communication systems
free download

ABSTRACT Mobile communication systems have revolutionized business communication and become common communication tools within business organizations. The dramatic increase in the use of mobile communication systems would not have been possible 

Security on Mobile Agent Based Communication System
free download

The foregoing thesis is hereby approved as a creditable study in the area of Information Technology carried out and presented in a manner satisfactory to warrant its acceptance as a pre-requisite to the degree for which it has been submitted. It is understood that by this 

Voice Recognition as Embedded Security Biometric for Wireless Mobile Communication
free download

ABSTRACT The growth in demand for security in services accessible via portable devices, like Personal Digital Assistants and Cell-phones, that require wireless networks to connect to distributed servers, has prompted active research. Biometric verification methods such 

Novel random number generators based on Si nanodevices for mobile communication securitysystems
free download

ABSTRACT We propose a new application of silicon (Si) nanodevices for mobile communication security systems, one of the most important elements of information technology (IT). We introduce Si nanodevices having nanoscaled electron channels and 

Security Enhancement in Mobile Communication Via Extensible Authentication Protocol (EAP) Via One Time Identification
free download

ABSTRACT Recently, several EAP (Extensible Authentication Protocol) authentication methods have been proposed to protect mobile communications. The objective of these methods is to ensure authentication in 802.11 wireless networks. However, they do not 

Security Architecture for Mobile Communication Systems
free download

R Vignettes-Bautista, L Palacios-Luengas ,cisce.escom.ipn.mx ABSTRACT This paper presents a proposal of an architecture able to guarantee authentication, confidentiality, integrity and non-repudiation services in cellular mobile telephony communication systems. This architecture has been defined independently 

Examining security in mobile communication networks
free download

ABSTRACT Due to advanced technological developments, mobile phone and other wireless device usage is increasing rapidly. The contents of the multimedia messages may be very important and confidential. Such confidentiality needs to be protected. Any interference 

Transport Layer Security (TLS) Implementation for Secured MN-HA Communication in MobileIPv6
free download

ABSTRACT Mobile IPv6 usually use the IPsec/IKEv2 to secure Mobile Node (MN) and Home Agent (HA) communication. The implementation of IPsec/IKEv2 with MIPv6 is complex because it requires a tight coupling between MIPv6 protocol part and the IPsec/IKEv2 part 

The Security-Communication tradeoff in Mobile Computing
free download

A Dadon-Elichai, D Raz ,cs.technion.ac.il ABSTRACT Mobile computing introduces a paradigm that enables new services to be deployed efficiently over the network. However, these new promising capabilities come with inherent security hazards, both for the machines that host the mobile code, and to the mobile code 

Security Evaluation of Mobile Device Integration with V2X Communication
free download

ABSTRACT In previous work, we investigated possibilities of an architecture for the functional distribution of a vehicle-to-x (V2X) system on two devices with different capabilities. One of the devices is an in-vehicle onboard unit (OBU), the other a personal 

An Efficient Security Aware Route Optimization Technique In Mobile IPV6 CommunicationNetworks
free download

MJ Islam, M Waliullah, MM Rahman ,elrond.informatik.tu-freiberg.de ABSTRACT –Privacy and Route optimization are important issues for reliable and efficient Mobile IPV6 communication networks. An efficient security based route optimization technique through a pseudo-tunnelling module has been proposed in this paper. 

FOURTH GENERATION OF MOBILE COMMUNICATION NETWORK: EVOLUTION, PROSPECTS, OBJECTIVES, CHALLENGES AND SECURITY
free download

A Rahman, K Sharma ,euroasiapub.org ABSTRACT Analyzing the attractive evolution of wireless communication, the much anticipated 4G standard promises wonders. This paper explores the trends in the evolution of wireless communication and its security. It outlines the requirements that are to be met 

Transport Layer Security-based Mobile IPv6 Security Framework for Mobile Node to Home Agent Communication
free download

ABSTRACT RFC 6275 Mobile IPv6 signaling between the mobile node and home agent is secured using IPsec. The security association between a mobile node and the home agent is established using IKEv1 or IKEv2. The security model specified for Mobile IPv6, which 

work on security for next-generation mobile communication systems that is carried out in our lab, emphasizing network layer security and applica-tion security 
free download

C Schaefer, H Wang, A Prasad, T Walter, P Schoo ,nttdocomo.co.jp The importance of Information Technology (IT) security has massively increased in recent years. The most important driving factors are the growing use of the Internet and web-based technologies. This also applies to Mobile Communications Systems (MCS), where there is 

Security and Privacy in Mobile Information and Communication Systems
free download

Volume Editors Andreas U. Schmidt novalyst IT AG Robert-Bosch Str. 38 61184 Karben, Germany andreas. schmidt novalyst. de Shiguo Lian France Telecom R&D 10F, South Twr., Raycom Infotech, Park C, 2 Science Institute South Rd. Haidian District, Beijing 100080, China 

Evaluation of Security Attacks on Different Mobile Communication Systems
free download

MA Mobarhan, MA Mobarhan, A Shahbahrami ,ampublisher.com ABSTRACT this paper presents an evaluation of the security architecture employed in the different mobile communication systems, GSM, GPRS, and UMTS. Different attacks such as Denial of Service (DoS), eavesdropping and over-billing threaten these systems. These 

Mobile  Wireless Communication Systems Security by Quantum Cryptography
free download

ABSTRACT Cryptography is a promising solution towards absolute security in Mobile  wireless communication Systems. While the use of quantum cryptography in Mobile  wireless communication gets significant advances. Research on the application of 

Transport Layer Security-based Mobile IPv6 Security Framework for Mobile Node to Home Agent Communication draft-korhonen-mext-mip6-altsec-01. txt Status
free download

ABSTRACT Mobile IPv6 signaling between the mobile node and home agent is secured using IPsec. The security association between a mobile node and the home agent is established using IKEv1 or IKEv2. The security model specified for Mobile IPv6, which relies on IKE/ 

Transport Layer Security-based Mobile IPv6 Security Framework for Mobile Node to Home Agent Communication draft-ietf-mext-mip6-tls-01. txt
free download

ABSTRACT RFC 3775 Mobile IPv6 signaling between the mobile node and home agent is secured using IPsec. The security association between a mobile node and the home agent is established using IKEv1 or IKEv2. The security model specified for Mobile IPv6, which 

Novel Approach for Secure Communication of Digital Signature using on-Demand Multipath Routing for Enhancing Network Security in Wireless Mobile Ad Hoc
free download

ABSTRACT With the advances of wireless communication technologies, small-size and high- performance computing and communication devices like laptops and personal digital assistants are increasingly used in daily life. After the success of second generation 

A reliable and flow control communication protocol for dynamic network coverage and datasecurity having energy audit functionality in Mobile sensor network
free download

ABSTRACT In a wireless sensor network mobility along with energy efficiency imposes significant challenges for MAC (medium access control) protocol design. An effective MAC protocol for Wireless Sensor Networks must consume less power, avoid collisions, be 

The Security Risks of Mobile Payment Applications Using Near-Field Communication
free download

ABSTRACT In this thesis the security landscape for near-field communication (NFC) payment applications on smartphones is investigated. The proposed model in this thesis is used to perform a robust risk assessment on a set of NFC related attack and fraud scenarios. The 

Mobile IPv6 Security Framework Using Transport Layer Security for Communication between the Mobile Node and Home Agent
free download

ABSTRACT Mobile IPv6 signaling between a Mobile Node (MN) and its Home Agent (HA) is secured using IPsec. The security association (SA) between an MN and the HA is established using Internet Key Exchange Protocol (IKE) version 1 or 2. The security model 

Automatic Tracking of Bandpass Sampling OFDM Signals in Mobile Environment for Security Communication Systems
free download

ABSTRACT Angle of Arrival (AOA) estimation is basic procedure required by several monitoring and tracking systems for security applications and other defense purposes. In this paper, a combined OFDM system and bandpass sampling method using Multiple Signal 

Database security meets mobile requirements
free download

 discussed. Mobile communication security with requirements like unobservability, privacy requirements in the location management. 4 Conclusion 

Mobile Implementation and Formal Verification of an e-Voting System.
free download

 technology is enabled. The implementation of M-SEAS exploits mechanisms for mobile communication security. This contributes to the development of mobile applications exploitable in everyday life. Actually, our prototype 

On the Security of Methods for Protecting Password Transmission.
free download

 He is a member of the Chinese As- sociation for Information Security (CCISA). His research interests include cryptography, mobile communication security, network security, and image encryption. Page 8. 476 Y.-M. Tseng, JK Jan, H.-Y. Chien 

Secure Key Management Protocol in the Wireless Sensor Network.
free download

 February 2000. He is currently working towards a PHD degree on computer science. His research interests also include cryptography, network security, information security, AAA, and mobile communication security. Sang-Ho 

Cryptographic protocols for third generation mobile communication systems
free download

 Authentication, key establishment, authentication model, formal analysis, forward secrecy, key recovery, key escrow, WAKE protocol, denial-of-service attack, electronic commerce, mobile security, mobile communication security, UMTS, IMT-2000, IS-41C, GSM. Page 6. vi 

A Formal Verification Centred Development Process for Security Protocols
free download

 Clarke EM, Jha S.,Marrero W. (2000). Verifying security protocols with Brutus. ACM Transactions on Software Engineering and Methodology (TOSEM), 9(4), 443-487. Coffey T.,Dojen R. (2003) Analysis of a mobile communication security protocol. 

Concepts and Scheme for Multilaterally Secure, User-Friendly Attribute-Based Messaging
free download

Key words: Attribute-Based Messaging, Attribute-Based Encryption, Mobile Communication Security, User-Friendly Security 1 Introduction Mobile communication has become an integral part of our modern informa- tion society. 

Partially blind threshold signature based on RSA
free download

Institute of Mathematics and Informatics, Vilnius Partially Blind Threshold Signature Based on RSA Hung-Yu CHIEN Department of Information Management 

Security Vulnerability Analysis and Forensic Data Research to Attacks on Mobile Stock Trading System in WiBro Network
free download

 He received the Ph.D. degree from the computer science department of the Soongsil University in 2004. His interests include Information Security of computer and networks, Ubiquitous Computing, Mobile Communication Security, and Forensics.

The Kingdom of Saudi Arabia
free download

 Page 2. 133 Safety on the Line Exposing the myth of mobile communication security The Fixed Broadband penetration rate stood at around 30.6 % of households at the end of Q3 201172.  20% Page 4. 135 Safety on the Line Exposing the myth of mobile communication security 

Islamic Republic of Iran
free download

 Page 2. 121 Safety on the Line Exposing the myth of mobile communication security communications.  Page 4. 123 Safety on the Line Exposing the myth of mobile communication security HOW OFTEN DO YOU ENCOUNTER BLOCKED WEBSITES? (IN COUNTRY SURVEY) 

Design And Implementation Of Mobile Payment Based On Multi-Interface Of Mobile Terminal
free download

 2.2 Mobile Communication Security Analysis In mobile commerce the security problem mostly caused by mobile terminal self and the wireless communication. The specific forms are in three the following aspect: 1, Itself of mobile terminal particularity. 

Technology Review of Mobile Computing
free download

 Mobile communication security, an applica- tion which enables wireless communication in a high-noise environment (Network Applications for Mobile Computing), WildBird32) which pro- vides information services for mobile terminals in a mobile environment, and INTERTop 

Novel random number generators based on Si nanodevices for mobile communication securitysystems
free download

ABSTRACT We propose a new application of silicon (Si) nanodevices for mobile communication security systems, one of the most important elements of information technology (IT). We introduce Si nanodevices having nanoscaled electron channels and 

The Researches on Safety Policies of Mobile-commerce Implemented by Small and Medium-sized Enterprises
free download

Y Jiayi, W Hongying ,seiofbluemountain.com  It is very important for mobile communication security to identify between users and mobile communication network. 2) Encryption protection for data: A data transmission security channel needs to be founded in communication. The channel is based on encrypting data. 

SMS Security Using NTRU Cryptosystem for M-Commerce
free download

AK Nanda, LK Awasthi ,115.249.35.5 Page 1. 1 SMS Security Using NTRU Cryptosystem for M-Commerce Ashok Kumar Nanda Research Scholar, CSE Department National Institute of Technology, Hamirpur,

mobile phone security research papers



Security services based on mobile phone networks: Cases in Japan
free download

ABSTRACT A new approach to location-based services (LBS) using geographical positioning technologies in mobile telephony has recently been developed. In Japan, security services using mobile phone geographical location technologies were launched around 2001, and 

Internet id-flexible re-use of mobile phone authentication security for service access
free download

ABSTRACT Identity management systems like .NET Passport and the Liberty Alliance Project allow for different forms of authentication to be used. Although simple username and password schemes are very commonly used, these are not considered to be very secure. 

Trends in users' security perceptions regarding mobile phone usage
free download

ABSTRACT Following a similar survey about users' security perceptions regarding mobile phone usage that took place in 2009 [23] we repeated the process in an extended pool of respondents at the same place (University of Ioannina, Greece) reaching 780 answers. 

Improving the Security of Mobile-Phone Access to Remote Personal Computers.
free download

ABSTRACT Cell phones are assuming an increasing role in personal computing tasks, but cell phone security has not evolved in parallel with this new role. In a class of systems that leverage cell phones to facilitate access to remote services, compromising a phone may 

Users? Perceptions of Mobile Phone Security: A Survey Study in the Kingdom of Saudi Arabia
free download

ABSTRACT With the rapid growth of mobile phone devices, there is a growing need for user authentication for the protection of data and services, and to promote public trust. This paper explores the perceptions of mobile phone users in the Kingdom of Saudi Arabia (KSA) 

MOBILE PHONE SECURITY SYSTEM
free download

VF Filipescu, O Barbu, G Ionita ,ace.ucv.ro ABSTRACT This paper presents a security system which permits the notification through mobile phone for some breach of close produced in any area supervised by the sensors and the operating from a distance, through mobile phone too, of any section of the warning block 

The young and the restless of mobile phone security (How security awareness and feeling lessen with age in students)
free download

I Androulidakis, G Kandus, A Tanovic, J Sofo ABSTRACT The present paper answers the question whether there is a statistically significant connection between the age of a student and his security awareness and practices in regards to mobile phone usage. It is based on the responses of a large pool of 7172 

Critical Analysis of Mobile Phone CommunicationSafety and Security Measures: Familiarity versus Actual Practice on Mobile Devices
free download

E Lomo-David, LJ Shannon ,proc.isecon.org ABSTRACT The use of mobile communicating devices such as mobile phones has become one of the most popular contemporary methods of exchange of information in the world. Since Nigeria is currently Africa's largest mobile phone market subscriber, the focus of this study 

Secure One Time Password Generation for Website Security using Mobile Phone with Biometrics
free download

CJN Rani, L Joseph, ER Naganathan ABSTRACT Authentication is an essential part of network security. It is a process of confirming the identity to ensure security, with a vital role to provide security in websites. Even though text password is a convenient user authentication on websites, it is prone to security 

Security practices of mobile phone student users in iauliai University (LT)
free download

I Androulidakis, G Kandus ,Andrejs Abele 7 15 Ontology based ,ief.uni-rostock.de ABSTRACT The present paper presents the results of a survey about users' security practices regarding mobile phone usage that took place in Lithuania's iauliai University in February 2010. Following the methodology of a previous similar survey in the University of Ioannina 

Security in mobile phone systems
free download

ABSTRACT In this paper, we discuss security issues associated with mobile telephone networks and focus on the unique issues that appear due to the mobility of the user. We provide an overview of how some of these issues are addressed in the second-generation mobile 

The Implementation of Face Security for Authentication Implemented on Mobile Phone
free download

ABSTRACT In this paper we are presenting the face recognition security for mobile phones. The model which has been applied for face recognition is Eigenface. The implementation consists from two parts: MATLAB and Droid Emulator for ANDROID mobile phones. The 

Enhancing Cost And Security Of Arabic SMS Messages Over Mobile Phone Network
free download

AA Abdullah ,computerscience.uomosul.edu.iq ABSTRACT This paper investigates a novel algorithm for compressing and encrypting Arabic short text messages (SMS messages). Short text messages are used in cellular networks. Compression is required for saving the transmission energy or to use bandwidth 

Android's Security Framework–Understanding the Security of Mobile Phone Platforms
free download

Theory A?/? is a ?synchronous stream cipher based on ?linear feedback shift registers (LFSRs). It has a ??-bit secret key. A GSM conversation is transmitted as a sequence of ?-bit frames ( ? bits in each direction) every ?.? mil- lisecond. Each frame is xored 

Information Security Threats Against Mobile Phone Services (Developers Perspective)
free download

ABSTRACT In this study, we have discussed the security of mobile phone services against information security threats with respect to developer's perspective. The use of internet has increased on the mobile phones so the threat has also increased against the mobile 

Authentication Using Mobile Phone as a Security Token
free download

ABSTRACT Today security concerns are on the rise in all areas industries such as banks, governmental applications, healthcare industry, militaryorganization, educational institutions etc, with one common weak link being passwords. Several proper strategies for using 

Survey Findings towards Awareness of Mobile Phones' Security Issues
free download

ABSTRACT In order to investigate some key issues related to mobile phones' security from a user's perspective, this paper explores and presents the results of a survey conducted in the University of Ioannina, Greece according to which 454 participants were asked about 

A practical home security system via mobile phones
free download

ABSTRACT This manuscript addresses the design and implementation of a practical home security system (PHSS). This system realizes its mobile surveillance via mobile phones by the planted Java applet. The challenge is that PHSS works independently under the 

Software card emulation in NFC-enabled mobile phones: Great advantage or securitynightmare
free download

ABSTRACT Software card emulation is a new approch to advance the interoperability of NFC with legacy contactless smartcard systems. It has been first introduced to NFC-enabled mobile phones by Research In Motion (RIM) on their BlackBerry platform. Software card 

Practical Experiences with NFC Security on mobile Phones
free download

ABSTRACT In this paper we present our practical experiences in implementing a secure NFC application on mobile phones. First, we present the characteristics of the NFC technology and its security features. Based on our practical, real-world offline NFC voucher payment 

Poster: User preferences for biometric authentication methods and graded security onmobile phones
free download

Conventional protection on mobile phones provides only a one-time verification system upon switch-on: unless locked, the device is always open; and automatic locking of the device is usually not the default setup on the phones of the top 5 vendors [4]. Many users 

A Security Architecture for Accessing Health Records on Mobile Phones.
free download

ABSTRACT Using mobile phones to access healthcare data is an upcoming application scenario of increasing importance in the near future. However, important aspects to consider in this context are the high security and privacy requirements for sensitive medical data. 

An end-to-end security architecture for multimedia content distribution on mobile phones
free download

ABSTRACT This paper presents the results of the French collaborative SDMO (Secured Diffusion of music on mObiles) project, which aims at combining traditional security tools such as cryptography and smart card with digital rights management and watermarking, to 

Differences in users' state of awareness and practices regarding mobile phones securityamong EU countries
free download

ABSTRACT As a style statement and useful communication device, the mobile phone has become a vital part of daily life for the majority of population in the developed world. While we are enjoying the technological advances that mobile phones offer, we are also facing 

Surveying users' practices regarding mobile phones' security features
free download

V CHRISTOU, NG BARDIS, I STILIOS ,Sciences ABSTRACT Despite the fact that mobile phone's security measures have been increased during the last years, users don't take the necessary measures to avoid a possible unauthorized access and/or sensitive data retrieval from their mobile phone. In order to 

CYBER SECURITY AND MOBILE THREATS: THE NEED FOR ANTIVIRUS APPLICATIONS FOR SMART PHONES
free download

ABSTRACT martphones are becoming a vehicle to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and 

Security on Mobile Phones with Lightweight Cryptographic Message Syntax
free download

Cryptographic Message Syntax (CMS) is a standard for protecting messages cryptographically. Using CMS, messages can be protected in different content types such as signed-data, enveloped-data, digested-data and authenticated-data. CMS is architected 

Security threats of executing malicious applications on mobile phones
free download

TH Smulders, EP Vink ,alexandria.tue.nl This research will try to give an answer to the following two questions:• What are the security threats for end users, service providers, terminal manufacturers, network operators and content providers when executing malicious applications on mobile terminals with an 

Perceived Security Risks of Using Quick Response (QR) Codes in Mobile Computing with Smart Phones
free download

LR Yin, Z Zhang, N Baldwin, M Senior ,facstaff.uww.edu ABSTRACT Quick response (QR) code utilization is everywhere from magazines and posters to Facebook and Twitter. Today's mobile devices offer advanced capabilities and connectivity along with unprecedented security risks that the majority of users don't realize exist–QR 

mobile encryption research papers




Securing electronic health records with novel mobile encryption schemes
free download

Mobile devices have penetrated the healthcare sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in healthcare applications the privacy and security of the transmitted information must be preserved. Therefore 

Selective bitplane encryption for secure transmission of image data in mobile environments
free download

ABSTRACT We propose selective bitplane encryption to provide secure image transmission in low power mobile environments. Two types of ciphertext only attacks against this scheme are discussed and we use the corresponding results to derive conditions for a secure use 

A new data encryption algorithm based on the location of mobile users
free download

ABSTRACT The wide spread of WLAN and the popularity of mobile devices increases the frequency of data transmission among mobile users. However, most of the data encryption technology is location-independent. An encrypted data can be decrypted anywhere. The 

An identity-based broadcast encryption scheme for mobile ad hoc networks
free download

ABSTRACT Dynamic ad hoc networks facilitate interconnections between mobile devices without the support of any network infrastructure. In this paper, we propose a secure identity- based ad hoc protocol for mobile devices to construct a group key for a setup of a secure 

Data encryption using the dynamic location and speed of mobile node
free download

Due to the fast development in electronic technology, some mobile devices are designed for new services in important applications in life. In this paper, we propose a new method of message security by using the coordinates in GPS service, where it can specify the path of 

Mobile encryption
free download

Executive Summary Due to the recently reported theft of a laptop containing sensitive data on 800,000 former employees' records, an encryption solution for all mobile devices is needed to protect the confidentiality of personally identifiable information and business 

Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds.
free download

ABSTRACT Cloud computing confers strong economic advantages, but many clients are reluctant to implicitly trust a third-party cloud provider. To address these security concerns, data may be transmitted and stored in encrypted form. Major challenges exist concerning 

Securing Control Signaling in Mobile IPv6 with Identity-Based Encryption
free download

ABSTRACT Control signaling messages in Mobile IPv6 are mainly used to inform the home agent (HA) and the correspondent node (CN) about the mobile node's (MN's) new address when its network attachment point is changed. In order to prevent various security attacks, 

An Identity-Based Broadcast Encryption Scheme for Mobile Ad Hoc Networks
free download

SK Verma, DB Ojha ,International Journal Of Computational Engineering ABSTRACT A Mobile Ad-hoc Network (MANET) is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The 

Design Method of AES Encryption Chip for Mobile and Portable Applications
free download

ABSTRACT A kind of design method of encryption chip for mobile and portable applications is proposed in this paper. The encryption chip implements the AES (Advanced Encryption Standard) algorithm, which is the most advanced symmetric cipher algorithm at present. 

Towards More Realistic Encryption Systems for Wireless Mobile Ad Hoc Networks
free download

PG Mpofu ABSTRACT A Mobile Ad Hoc Network (MANET) is a network comprising mobile nodes that combine temporarily to form a network. This network does not make use of the usual network infrastructure for example physical cables and a central facility for management and 

Research of multi-interface data encryption equipment based on mobile terminal
free download

ABSTRACT Mobile payment security is one of the issues in the mobile terminal itself, this article presents a mobile payment implement solution with distributed key based on the current mobile multi-interface, analysis the mobile payment workflow, gives Multi-interface data 

Selective Bitplane Encryption For Secure Transmission Of Image Data In MobileEnvironment
free download

MG Nazneen, S Banu, Z Tabassum, K Fatima, A Shariff ABSTRACT In this paper, we propose selective bitplane encryption to provide secure image transmission in low power mobile environment. We assume a 512 X 512 pixels image to be given in 8bit/pixel (bpp) precision. We consider the 8bpp data in the form of 8 bit planes, 

Enhanced Diffusion Encryption for Video Transmission over Mobile WiMax Networks
free download

ABSTRACT As a promising broadband wireless technology, WiMax has many salient advantages over such as: high data rates, quality of service, scalability, security, and mobility. Many sophisticated authentication and encryption techniques have been 

Court Decision on a Class Action and an Office for Civil Rights Action Highlight the Importance ofMobile Device Encryption
free download

Two recent actions in September 2012-a court rul-ing and an agency settlement-highlight the importance of mobile device encryption for health care providers. In the first action, the Court of Appeals for the Eleventh Circuit permitted a class action, stemming from the theft 

Security and Dynamic Encryption System in Mobile Ad-Hoc Network
free download

HY Peter, UW Pooch ,cdn.intechopen.com Wireless network technology enables computing devices to communicate with each other without any physical medium. Compared with wired networks, wireless communication provides better connectivity and mobility, which allows mobile devices to access other 

Novel Fast Encryption Algorithms for Multimedia Transmission over Mobile WiMax Networks
free download

ABSTRACT Security support is mandatory for any communication networks. For wireless systems, security support is even more important to protect the users as well as the network. Since wireless medium is available to all, the attackers can easily access the network and 

Software Encryption in Mobile Devices
free download

ABSTRACT This thesis is based on peoples need to be able to encrypt sensitive data on their mobile devices. The application will allow them to do so effortless, and also ensure them that the security is up to standard. This will be done by using the RSA algorithm that was 

Improved Mobile WiMax Image Privacy Using Novel Encryption Techniques
free download

ABSTRACT Mobile WiMax security standards from IEEE specify some powerful standards- based security controls, including PKMv2 EAP-based authentication and over-the-air AES- based encryption. But encryption technique does not guarantee a powerful secure end-to- 

Hybrid Attribute-Based Encryption and Re-Encryption for Scalable Mobile Applications in Clouds
free download

ABSTRACT Outsourcing data to the cloud is beneficial for reasons of economy, scalability, and accessibility, but significant technical challenges remain. Sensitive data stored in the cloud must be protected from being read in the clear by a cloud provider that is honest-but- 

Deniable Storage Encryption for Mobile Devices
free download

Smartphones, and other mobile computing devices, are being widely adopted globally as the de-facto personal computing platform. Given the amount of sensitive information accumulated by these devices, there are serious privacy and security implications for both 

A Message Encryption System Architecture for MeeGo Mobile OS
free download

A Ovseenko, V Petrov ,fruct.org ABSTRACT In this paper the issues of existing security mechanisms of mobile operation systems are highlighted. The architecture of message encryption system for MeeGo mobile OS, which deeply integrates into the Qt Message Framework (default MeeGo message 

Applying Puzzle Encryption In The On-Demand Routing Protocols In Mobile Ad Hoc Networks (Manets)
free download

ABSTRACT Recently, the use of Mobile Ad Hoc Networks (MANETs) systems in our life has rapidly increased. Nevertheless, we need for this efficiency and privacy routing protocols to exchange the information between the nodes in this kind of networks. We propose a new 

A Novel Security Approach in Mobile Agent A Novel Security Approach in Mobile Agent UsingEncryption Encryption Encryption
free download

N Gupta, A Dixit ABSTRACT The appearance of software agents has given rise too much discussion of what such an agent is and how it differs from programs in general. An agent is anything that can be viewed as perceiving its environment through sensorsacting upon that environment 


FREE ENGINEERING RESEARCH PAPERS