Mobile Storage protection during Encryption Algorithm
نویسندگان
چکیده
منابع مشابه
A Secure Mobile Cloud Storage Environment using Encryption Algorithm
Cloud computing frameworks such as, Google App Engine, Amazon Web Services, Windows Azure, and open source frameworks such as OpenStack have become increasingly popular among practitioners. Also, the growth in usage and deployment of smartphone platforms and applications worldwide is increasing rapidly. Mobile cloud computing promotes use of cloud based services in a mobile environment. Data an...
متن کاملDeniable Storage Encryption for Mobile Devices
Deniable Storage Encryption for Mobile Devices Adam Skillen Smartphones, and other mobile computing devices, are being widely adopted globally as the de-facto personal computing platform. Given the amount of sensitive information accumulated by these devices, there are serious privacy and security implications for both personal use and enterprise deployment. Confidentiality of data-at-rest can ...
متن کاملMobile encryption for laptop data protection (MELP)
Based on the advances in laptop technologies and the mobility characteristics, laptops have become a vital device used at various places. Usually, numerous sensitive files such as credit card numbers and Web cookies are stored on laptops for convenient usage. However, if a laptop is stolen, the data stored on it is easily leaked; which may cause serious consequences. Encrypting files by encrypt...
متن کاملResilience Enhancement of Active Distribution Networks Via Mobile Energy Storage Systems and Protection Coordination Consideration
Owing to the portability and flexibility of mobile energy storage systems (MESSs), they seem to be a promising solution to improve the resilience of the distribution system (DS). So, this paper presents a rolling optimization mechanism for dispatching MESSs and other resources in microgrids in case of a natural disaster occurrence. The proposed mechanism aims to minimize the total system cost b...
متن کاملCryptanalysis of GSM encryption algorithm A5/1
The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed an attack on A5/1 with a time and data complexity of 239.91and 221.1, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering and Technology
سال: 2017
ISSN: 2319-8613,0975-4024
DOI: 10.21817/ijet/2017/v9i6/170906303