Innovative Methodologies for Mobile Security and Cryptography

Author(s):  
Modafar Ati ◽  
Reem Al-Bostami
Keyword(s):  
Author(s):  
Kartik Khurana ◽  
Harpreet Kaur ◽  
Ritu Chauhan ◽  
Shalu Chauhan ◽  
Shaveta Bhatia ◽  
...  

Now a day’s mobile communication has become a serious business tool for the users. Mobile devices are mainly used for the applications like banking, e-commerce, internet access, entertainment, etc. for communication. This has become common for the user to exchange and transfer the data. However people are still facing problems to use mobile devices because of its security issue. This paper deals with various security issues in mobile computing. It also covers all the basic points which are useful in mobile security issues such as categorisation of security issues, methods or tactics for success in security issues in mobile computing, security frameworks.


2019 ◽  
Vol 12 (2) ◽  
pp. 333-337
Author(s):  
Ghada Alhudhud ◽  
Duaa H Alsaeed ◽  
Heyam 1, ◽  
Abeer S Al-Humaimeedy ◽  
Isra Al-Turaiki

2013 ◽  
Vol 411-414 ◽  
pp. 1505-1509
Author(s):  
Long Chen ◽  
Shuan Chen ◽  
Yu Qing He ◽  
Jian Guo Wei ◽  
Jian Wu Dang

In this paper, we proposed a mobile security system based on IP camera network video surveillance by improving the traditional monitoring methods. This system includes three parts: Android mobile client, cloud server, IP camera monitoring terminals. By setting IP cameras at 24 fps but only sending one frame each second, we can infer the situation by analyzing of the single image and reduce the amount of data transmission. User can check the live scenes and send control commands to monitoring terminal or receive the push information from the server to freely give alarm signal to users anytime, anywhere. And users can also select any regions or any specific objects to monitor, the server will real-time monitor each scene according to the specific requirements by using the algorithms of image contrast and depth estimation. The experiment results show that the system can greatly improve the accuracy of the alarm.


Author(s):  
Şerif Bahtiyar ◽  
Orhan Ermiş ◽  
Mehmet Ufuk Çağlayan
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document