Securing peer-to-peer mobile communications using public key cryptography: new security strategy
Mobile phones are considered to be the most common communication devices in history. Recently, mobile phones are not only used for casual greetings but also, sending and receiving important data such as, social security numbers, bank account details and passwords. Public key cryptography is a proven...
Main Authors: | Al- Bakri, S.H., Mat Kiah, M.L., Zaidan , A. A., Zaidan, B.B., Alam, Gazi Mahabubul |
---|---|
Format: | Article |
Language: | English |
Published: |
Academic Journals
2011
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/18715/ http://irep.iium.edu.my/18715/ http://irep.iium.edu.my/18715/1/Al-bakri_et_al.pdf |
Similar Items
-
Analyzing communication overhead in linearizing peer to peer system
by: Muhyiddeen, Abdulfattah, et al.
Published: (2016) -
Peer-to-peer leadership why the network is the leader
by: Baker
Published: (2014) -
Linearizing peer-to-peer systems with Oracles
by: Mohd. Nor, Rizal, et al.
Published: (2013) -
Secure topology for electronic medical record transmission
by: Alanazi, Hamdan O., et al.
Published: (2010) -
Peer-to-peer video-on-demand in future internet
by: Fouda, Mostafa M., et al.
Published: (2013)