Securing peer-to-peer mobile communications using public key cryptography: new security strategy
Mobile phones are considered to be the most common communication devices in history. Recently, mobile phones are not only used for casual greetings but also, sending and receiving important data such as, social security numbers, bank account details and passwords. Public key cryptography is a proven...
| Main Authors: | Al- Bakri, S.H., Mat Kiah, M.L., Zaidan , A. A., Zaidan, B.B., Alam, Gazi Mahabubul |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Academic Journals
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/18715/ http://irep.iium.edu.my/18715/1/Al-bakri_et_al.pdf |
Similar Items
Secure topology for electronic medical record transmission
by: Alanazi, Hamdan O., et al.
Published: (2010)
by: Alanazi, Hamdan O., et al.
Published: (2010)
Secure referee selection for fair and responsive peer-to-peer gaming
by: Webb, Steven, et al.
Published: (2009)
by: Webb, Steven, et al.
Published: (2009)
Secure referee selection for fair and responsive peer to peer gaming
by: Webb, Steven, et al.
Published: (2008)
by: Webb, Steven, et al.
Published: (2008)
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
by: Sinnanaidu, Subba Rao
Published: (2004)
by: Sinnanaidu, Subba Rao
Published: (2004)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
A secure chat application based on pure peer-to-peer architecture
by: Mohamed, Mohamad Afendee, et al.
Published: (2015)
by: Mohamed, Mohamad Afendee, et al.
Published: (2015)
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)
by: Zaidan , A. A., et al.
Published: (2009)
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
by: Abomhara, Mohamed, et al.
Published: (2011)
by: Abomhara, Mohamed, et al.
Published: (2011)
Suitability of using symmetric key to secure multimedia data: an overview,
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
A review on multimedia communications cryptography
by: Salem, Yasser, et al.
Published: (2011)
by: Salem, Yasser, et al.
Published: (2011)
A methodology for determining riskiness in peer-to-peer communication
by: Hussain, Omar, et al.
Published: (2005)
by: Hussain, Omar, et al.
Published: (2005)
Mobile Peer-to-Peer Application for Resource Sharing
by: Lee, Jia Yi
Published: (2016)
by: Lee, Jia Yi
Published: (2016)
Analyzing communication overhead in linearizing peer to peer system
by: Muhyiddeen, Abdulfattah, et al.
Published: (2016)
by: Muhyiddeen, Abdulfattah, et al.
Published: (2016)
Formalizing a grammar for reputation in peer-to-peer communication
by: Hussain, Farookh, et al.
Published: (2005)
by: Hussain, Farookh, et al.
Published: (2005)
Fintech peer-to-peer lending mobile application development
by: Oon, Wei Kin
Published: (2022)
by: Oon, Wei Kin
Published: (2022)
Coding, cryptography, information security and OFDM
Published: (2011)
Published: (2011)
Topics in coding, cryptography and information security
Published: (2011)
Published: (2011)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Public key cryptography in resource-constrained WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
The design and development of peer-to-peer based mobile application for petty trading
by: Ishak, Iskandar, et al.
Published: (2013)
by: Ishak, Iskandar, et al.
Published: (2013)
A comparison of key attributes between peer-to-peer accommodations and hotels using online reviews
by: Zhang, G., et al.
Published: (2019)
by: Zhang, G., et al.
Published: (2019)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
CCS523 – COMPUTER SECURITY AND CRYPTOGRAPHY NOV 2010
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
CCS 523 - COMPUTER SECURITY AND CRYPTOGRAPHY NOV 2008
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CCS523- COMPUTER SECURITY AND CRYPTOGRAPHY JANUARI 2012
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
A social network Peer-to-Peer model for peer clustering
by: Modarresi, Amir, et al.
Published: (2008)
by: Modarresi, Amir, et al.
Published: (2008)
Security improvement of credit card online purchasing system
by: Naji, Ahmed Wathik, et al.
Published: (2011)
by: Naji, Ahmed Wathik, et al.
Published: (2011)
Teamwork skills : peer evaluation in mobile application
(ePeers) / Noor Ismahani Hasbullah
by: Noor Ismahani, Hasbullah
Published: (2016)
by: Noor Ismahani, Hasbullah
Published: (2016)
A systematic review of file sharing in mobile devices using peer-to-peer systems
by: Yasin, Waheed, et al.
Published: (2011)
by: Yasin, Waheed, et al.
Published: (2011)
Optimizing security and flexibility by designing a high security system for e-government servers
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
Linearizing peer-to-peer systems with Oracles
by: Mohd. Nor, Rizal, et al.
Published: (2013)
by: Mohd. Nor, Rizal, et al.
Published: (2013)
Peer To Peer, SMK Tanjong Bungah
by: CETREE, Pusat Pendidikan dan Latihan Tenaga Boleh Baharu, Kecekapan Tenaga dan Teknologi Hijau
Published: (2012)
by: CETREE, Pusat Pendidikan dan Latihan Tenaga Boleh Baharu, Kecekapan Tenaga dan Teknologi Hijau
Published: (2012)
Comparisons process-to-bay level peer-to-peer network delay in IEC 61850 substation communication systems
by: Ali, Nasser Hasan, et al.
Published: (2014)
by: Ali, Nasser Hasan, et al.
Published: (2014)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Deployment of new dynamic cryptography buffer for SCADA security enhancement
by: Aamir, Shahzad, et al.
Published: (2014)
by: Aamir, Shahzad, et al.
Published: (2014)
Cryptanalysis, provable security and implementation of fuzzy identity-based cryptography
by: Tan, Syh Yuan
Published: (2014)
by: Tan, Syh Yuan
Published: (2014)
Process-to-Bay Level Peer-to-Peer Network Delay in IEC 61850 Substation Communication Systems
by: Das, Narottam, et al.
Published: (2013)
by: Das, Narottam, et al.
Published: (2013)
Communications cryptography
by: Khalifa, Othman Omran, et al.
Published: (2004)
by: Khalifa, Othman Omran, et al.
Published: (2004)
Similar Items
-
Secure topology for electronic medical record transmission
by: Alanazi, Hamdan O., et al.
Published: (2010) -
Secure referee selection for fair and responsive peer-to-peer gaming
by: Webb, Steven, et al.
Published: (2009) -
Secure referee selection for fair and responsive peer to peer gaming
by: Webb, Steven, et al.
Published: (2008) -
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
by: Sinnanaidu, Subba Rao
Published: (2004) -
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)