Akram, S T (2014) Security in smartphones and tablets. BTech thesis.
| PDF 1188Kb |
Abstract
Mobile devices like smartphones and tablets are turning into a vehicle for productive and advantageous approach to access, find and share information/data. However, lack of the efficient and proper security measures has paved a way for the cyber-attackers to get this information and misuse it for their own purpose. Data leakage resulting from device loss or theft is major security risk associated with the smartphones and other mobile devices. One way to protect the data is to use encryption/decryption technique. Though there is many encryption/decryption technique available but most of them are susceptible to various attacks. Another problem is there is no proper encryption/decryption procedure for end point to end point security (between two or more phones). We proposed novel key generation techniques to be used in encryption/decryption process. The same technique can also be used for end point to end point secure communication. These techniques have been tested against various attacks on real android devices and it has been found that it withstand all types of attacks.
Item Type: | Thesis (BTech) |
---|---|
Uncontrolled Keywords: | Security; key Generation; Android |
Subjects: | Engineering and Technology > Computer and Information Science > Information Security |
Divisions: | Engineering and Technology > Department of Computer Science |
ID Code: | 5990 |
Deposited By: | Hemanta Biswal |
Deposited On: | 25 Aug 2014 11:44 |
Last Modified: | 25 Aug 2014 11:44 |
Supervisor(s): | Jena, S K |
Repository Staff Only: item control page