• No results found

[PDF] Top 20 A Survey on the Security Features of Cryptographic Techniques in Mobile Devices

Has 10000 "A Survey on the Security Features of Cryptographic Techniques in Mobile Devices" found on our website. Below are the top 20 most common "A Survey on the Security Features of Cryptographic Techniques in Mobile Devices".

A Survey on the Security Features of Cryptographic Techniques in Mobile Devices

A Survey on the Security Features of Cryptographic Techniques in Mobile Devices

... Wireless Mobile Devices by introducing multifunctional applications embedded in a small device by replacing the traditional and fixed wired ...technology. Mobile devices play a vital role in ... See full document

6

Survey on Data Security for Mobile Devices

Survey on Data Security for Mobile Devices

... for security reasons. Later it became necessary for message security especially during wars and territory ...towards security, techniques and mechanism of security all of which have ... See full document

5

A survey of various Cryptographic techniques and their Issues

A survey of various Cryptographic techniques and their Issues

... Data security comprises of two parts ...Data Security means securing the data from unauthorized access as well as securing it from ...proper security measures to protect the data from being stolen or ... See full document

6

Mobile Data Transfer Security through a Cryptographic Approach

Mobile Data Transfer Security through a Cryptographic Approach

... technology cryptographic algorithms can perform even more stronger than before considering that this is proposed in multi system environment (mobile & cloud) and cryptography proposed on their access ... See full document

5

Estimation of cryptographic approach on iot devices

Estimation of cryptographic approach on iot devices

... IoT devices develop in an ecosystem of co-existence and ...actual cryptographic ciphers on such devices and determine if they are viable in terms of swiftness of execution time and memory consumption ... See full document

6

Mobile Application Development: All the Steps and Guidelines for Successful Creation of Mobile App: Case Study

Mobile Application Development: All the Steps and Guidelines for Successful Creation of Mobile App: Case Study

... handheld devices such as mobile phones and Personal Digital ...of mobile apps, the user is provided with various features that will enable him to fulfill all his needs and much ... See full document

6

A Technology for Sharing Battery Power of Smartphone using P2P Network

A Technology for Sharing Battery Power of Smartphone using P2P Network

... of mobile battery drops out in a ...their devices with as much power as possible, in the fear of losing power during critical ...charging devices by tethering them to a ...nearby devices. This ... See full document

5

Usage of Mobile Devices as Learning Tools among Higher Education and Undergraduate Student in Amman University College

Usage of Mobile Devices as Learning Tools among Higher Education and Undergraduate Student in Amman University College

... Statistics Survey reports; that the use of information and communications technology at private residence in 2013, has risen in the proportion of Households that have Internet available in homes where amounted to ... See full document

6

Survey on Cryptographic Data Security over Cloud

Survey on Cryptographic Data Security over Cloud

... Abstract—in cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information, the cloud servers cannot be ... See full document

5

A Survey on Various Cryptographic Algorithms for Security Enhancement

A Survey on Various Cryptographic Algorithms for Security Enhancement

... internet. These services and products are provided by cloud service providers. Through cloud computing the service providers deliver almost everything as a service over internet on user demand. The user demands may ... See full document

5

A Survey of Spectrum Sensing Techniques in Cognitive Radio Networks

A Survey of Spectrum Sensing Techniques in Cognitive Radio Networks

... need an overhaul. congestion resulting from the coexistence of heterogeneous devices running in those bands is on the upward thrust. take the license- loose commercial, clinical, and medical (ism) radio band. it's ... See full document

8

Survey on Cryptographic Schemes for Security in          Cloud Data Storage

Survey on Cryptographic Schemes for Security in Cloud Data Storage

... of security threats. Cloud applications may require all standard security functions including data confidentiality, integrity, privacy, robustness and access ...providing security to the cloud is the ... See full document

5

Extending Knowledge Management to Mobile Workplaces

Extending Knowledge Management to Mobile Workplaces

... supported mobile phone, GSM cards, integrated mobile phone technology or can be equipped with wireless LAN cards for medium-range connectivity at high ...include mobile phone functionality and an ... See full document

9

A Survey of Hybrid Wireless Localization Techniques in Non Line of Sigh

A Survey of Hybrid Wireless Localization Techniques in Non Line of Sigh

... depends on the propagation conditions of the wireless channels. High accuracy can be achieved when the line-of- sight (LOS) paths between the unknown node and anchor nodes are present. However, harsh radio propagation ... See full document

9

Index Terms: Classification, ,Data energy consumption, Data processing ,KNN.

Index Terms: Classification, ,Data energy consumption, Data processing ,KNN.

... programming techniques, and an autonomous power manager build upon the proposed API and infrastructure ...of mobile and small embedded devices, energy consumption becomes increasingly ...which ... See full document

11

A Survey in Cloud Computing : Security Issues and Their Solutions

A Survey in Cloud Computing : Security Issues and Their Solutions

... about security of their data stored on cloud. In this survey paper we discuss various security issues faced by cloud computing and their solution using different cryptographic algorithms based ... See full document

5

Cryptographic Techniques for Wireless Sensor Network Security

Cryptographic Techniques for Wireless Sensor Network Security

... the security architecture of WSNs, using the most efficient and sufficiently secure algorithm which is an effective means of conserving resources of tiny ...data security using data encoding patent and ... See full document

6

A Comprehensive Survey on Wireless Sensor Net...

A Comprehensive Survey on Wireless Sensor Net...

... Their low cost provides a means to deploy large sensor arrays in a variety of conditions capable of performing both military and civilian tasks. But sensor networks also introduce severe resource constraints due to their ... See full document

7

SECURITY USING CRYPTOGRAPHIC TECHNIQUES FOR  IMAGE PROCESSING

SECURITY USING CRYPTOGRAPHIC TECHNIQUES FOR IMAGE PROCESSING

... 22 INTERNATIONAL JOURNAL OF ADVANCES IN ENGINEERING RESEARCH Encryption of data [2] has become an important way to protect data resources especially on the internet, intranets and extranets. Encryption is the process of ... See full document

9

Analysis and Security Implementation in Embedded Systems

Analysis and Security Implementation in Embedded Systems

... Security of embedded systems is very important. Strong security mechanisms prevent damages and economical losses while also offering new business ...sound security solutions are not attained ... See full document

6

Show all 10000 documents...