Security Enhancement in Android using Ellipic Curve Cryptography
نویسندگان
چکیده
منابع مشابه
Elliptic curve cryptography in cloud computing security
Cloud computing is a technological advancement that has been growing swiftly during the last decade. In simple terms, cloud computing is a technology that enables shared, remote, on-demand and ubiquitous access to services through the Internet. It enables consumers to access applications and services that reside on remote servers, without having to allocate large amounts of storage space on the...
متن کاملA Review on Distributed System Security using Elliptic Curve Cryptography
Most of the security architecture uses public key cryptosystems for authentication and to secure the communication that takes place on distributes sites. Now a day’s identity based cryptography and certificate-less public key cryptography are used for enhancing the security. Certificate-less based cryptography has reduced the certificate necessity for key distribution and reducing the problem o...
متن کاملEnhancement of Security in Visual Cryptography System using Genetic Algorithm
Visual Cryptography (VC) is a special type of encryption technique where an image or document is encrypted by breaking it down into shares. These shares are then printed on transparencies. Decryption is done by superimposing the shares. Thus one can visually decode the secret image without computation. However, this property makes VC insecure as a third party can easily retrieve the secret info...
متن کاملSecurity Enhancement of Android USB Debugging Mode
Till today, there are more than 1 billion smartphone users worldwide. With smartphones become more popular, more security instances have been reported. Therefore, it is important to study the security issues of smartphones and develop effective approaches to safeguard them. This research is focused on Android based systems, in particular, the security of Android Debug Bridge (ADB). As an import...
متن کاملEnhancement of Network Security Techniques using Quantum Cryptography
Quantum cryptography uses the law of quantum physics for unconditionally secure data communications. This is a main achievement because the cryptography currently in use, known as conventional cryptography, relies completely on the hardness of a mathematical equation. The advances in quantum computing has threatened the computational security of classical cryptography, which in theory can effic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Security and Its Applications
سال: 2017
ISSN: 1738-9976,1738-9976
DOI: 10.14257/ijsia.2017.11.6.03