An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
The ubiquity and huge proliferation of mobile and handheld devices, such as smartphones and tablets, are globally undeniable where Google’s Android operating system dominates the largest share of mobile platforms in the market. The vast spread and increased capabilities of these devices have c...
| Main Author: | Alomari, Mohammad Ahmed Mohammad |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/68500/ http://psasir.upm.edu.my/id/eprint/68500/1/FK%202018%208.pdf |
Similar Items
Implementation of a parallel XTS encryption mode of operation
by: Alomari, Mohammad Ahmed, et al.
Published: (2014)
by: Alomari, Mohammad Ahmed, et al.
Published: (2014)
A parallel XTS encryption mode of operation
by: Alomari, Mohammad Ahmed, et al.
Published: (2009)
by: Alomari, Mohammad Ahmed, et al.
Published: (2009)
A framework for GPU-accelerated AES-XTS encryption in mobile devices
by: Alomari, Mohammad Ahmed, et al.
Published: (2011)
by: Alomari, Mohammad Ahmed, et al.
Published: (2011)
Enhancing performance of XTS cryptography mode of operation using parallel design
by: Ahmed Alomari, Mohammad
Published: (2009)
by: Ahmed Alomari, Mohammad
Published: (2009)
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
Light database encryption design utilizing multicore processors for mobile devices
by: Alomari, Mohammad Ahmed, et al.
Published: (2019)
by: Alomari, Mohammad Ahmed, et al.
Published: (2019)
Advanced encryption standard-XTS implementation in field programmable gate array hardware
by: Ahmed, Shakil, et al.
Published: (2015)
by: Ahmed, Shakil, et al.
Published: (2015)
A relay attack for host-based card emulation (HCE) using NFC-enabled device for mobile payment
by: Che Hasan, Hafizah
Published: (2018)
by: Che Hasan, Hafizah
Published: (2018)
A framework for caching relevant data divisions for checking integrity constraints of mobile databases
by: Ibrahim, Hamidah, et al.
Published: (2009)
by: Ibrahim, Hamidah, et al.
Published: (2009)
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014)
by: Shaukat, Haafizah Rameeza
Published: (2014)
Optimized scheme for fast mobile IPV6 handover and mobility in IEEE 802.16 network
by: Seyyedoshohadaei, Seyyed Masoud
Published: (2013)
by: Seyyedoshohadaei, Seyyed Masoud
Published: (2013)
Digital forensics framework for investigating client cloud storage applications on smartphones
by: Daryabar, Farid
Published: (2015)
by: Daryabar, Farid
Published: (2015)
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
by: Ahmed, Shakil
Published: (2013)
by: Ahmed, Shakil
Published: (2013)
Embedded devices security: design and implementation of a light RDBMS encryption utilizing multi-core processors
by: Alomari, Mohammad Ahmed, et al.
Published: (2023)
by: Alomari, Mohammad Ahmed, et al.
Published: (2023)
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
by: Syed Adnan, Syed Farid
Published: (2019)
by: Syed Adnan, Syed Farid
Published: (2019)
Effective implementation of AES-XTS on FPGA
by: Ahmed, Shakil, et al.
Published: (2011)
by: Ahmed, Shakil, et al.
Published: (2011)
Hierarchical QoS admission control mechanism for IEEE 802.16j mobile multihop relay WiMAX network / Rohaiza Yusoff
by: Yusoff, Rohaiza
Published: (2014)
by: Yusoff, Rohaiza
Published: (2014)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Data caching framework and strategies for integrity constraint checking in mobile database system
by: Dzolkhifli, Zarina
Published: (2012)
by: Dzolkhifli, Zarina
Published: (2012)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
Implementing label filters on a shared tree mobile multicast architecture
by: Singh, Jaipal, et al.
Published: (2005)
by: Singh, Jaipal, et al.
Published: (2005)
Smart Catalogue Mobile Application (SCM) with Beacon Device
by: Odzaly, Edzreena Edza Binti, et al.
Published: (2020)
by: Odzaly, Edzreena Edza Binti, et al.
Published: (2020)
Voice controlled mobile embedded device
by: Chong, Yi Xuan
Published: (2020)
by: Chong, Yi Xuan
Published: (2020)
Route Optimisation For Mobile Ipv6
by: Yahaya, Coulibaly
Published: (2002)
by: Yahaya, Coulibaly
Published: (2002)
Performance evaluation of identity-based encryption (IBE) remote attestation protocol in wireless sensor networks / Roszainiza Rosli
by: Rosli, Roszainiza
Published: (2014)
by: Rosli, Roszainiza
Published: (2014)
A framework implementation for information accuracy in mobile commerce / Emafazzila Baharudin
by: Baharudin, Emafazzila
Published: (2007)
by: Baharudin, Emafazzila
Published: (2007)
Combined coding and modulation in frequency-selective mobile communications.
by: Caldera, Manora K.
Published: (2000)
by: Caldera, Manora K.
Published: (2000)
Reputation aware obfuscation for mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2015)
by: Radenkovic, Milena, et al.
Published: (2015)
Determinant of customer intention to adopt mobile banking services in Sauda Arabia
by: Alsheikh, Layla Hodaed
Published: (2013)
by: Alsheikh, Layla Hodaed
Published: (2013)
Participant experiences of mobile device-based diary studies
by: Sun, Xu, et al.
Published: (2013)
by: Sun, Xu, et al.
Published: (2013)
BioHerbWebs: a mobile knowledge portal for bioinformatics community of practice with a collaborative environment
by: Abdullah, Rusli, et al.
Published: (2008)
by: Abdullah, Rusli, et al.
Published: (2008)
Mobile synchronization framework to enhance large object management in mobile cloud storage service
by: Faniband, Yunus Parvej
Published: (2021)
by: Faniband, Yunus Parvej
Published: (2021)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
A reliable unicast routing protocol for mobile ad hoc network
by: Sargolzaey, Hadi
Published: (2013)
by: Sargolzaey, Hadi
Published: (2013)
A model for transaction management in mobile databases
by: Abdul Mehdi, Ziyad, et al.
Published: (2010)
by: Abdul Mehdi, Ziyad, et al.
Published: (2010)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
A simulative study on the performance evaluation for simultaneous and successive mobility for mobile IPv6
by: Abdullah, Ibrahim, et al.
Published: (2010)
by: Abdullah, Ibrahim, et al.
Published: (2010)
Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer
by: Malekzadeh, Mina
Published: (2007)
by: Malekzadeh, Mina
Published: (2007)
Similar Items
-
Implementation of a parallel XTS encryption mode of operation
by: Alomari, Mohammad Ahmed, et al.
Published: (2014) -
A parallel XTS encryption mode of operation
by: Alomari, Mohammad Ahmed, et al.
Published: (2009) -
A framework for GPU-accelerated AES-XTS encryption in mobile devices
by: Alomari, Mohammad Ahmed, et al.
Published: (2011) -
Enhancing performance of XTS cryptography mode of operation using parallel design
by: Ahmed Alomari, Mohammad
Published: (2009) -
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)