Mobile communication devices have become popular tools for gathering and disseminating information and data. When sensitive information is exchanged using SMS, it is crucial to protect the content from eavesdroppers as well as ensuring that the message is sent by a legitimate sender. Using an encryption technique to secure SMS data increases its length and accordingly the cost of sending it. This paper provides a hybrid compression encryption technique to secure the SMS data. The proposed technique compresses the SMS to reduce its length, then encrypts it using RSA algorithm. A signature is added to the encrypted SMS for signing it to differentiate it from other SMS messages in SMSINBOX. The experimental results which are based on Symbian OS show that the proposed technique guarantees SMS data security without increasing its size.
SMS(Short Message Service)plays vital role in
day to day life. SMS used in many real world application like
Transportation Information System, private health facilities
using SMS, mobile banking, participation in elections through
SMS, in Crime Scene Investigation and many more.The major
problem facing in SMS is security ,while transferring message
like account number or password from one user to another
user it just taken as a plain text so there some type of attacks
like man in the middle attack, disclosure, replay attack takes
place and causing a huge risk. The traditional SMS service
does not provide information security like confidentiality,
integrity, authenticity. The attacker can alter SMS Information
using weak encryption algorithm like A5/1 or A5/2.The existing
protocol used for providing security in SMS is based on
asymmetric and symmetric key. To provide secure end to end
communication Easy SMS protocol is used which is completely
based on symmetric key. On applying AES algorithm it may
provide effective encryption for password. The expecting result
on using Easy SMS protocol is to reduce bandwidth
consumption and increasing the password or pass code
strength through SMS.
Seps aka a secure evolved packet system authentication and key agreement sch...csandit
In this paper, we propose a secure authentication of the Evolved Packet System Authentication
and Key Agreement (EPS-AKA) for the LTE-A network. Our scheme is proposed to solve the
problem of sending the IMSI as a clear text, and hence prevents the mobility management entity
attack. We will use public key (PK) cryptography to protect the transmitted messages, the RSA
scheme computation to compute a temporary value to the IMSI, and nonce to generate
challenge messages toward the opposite side. Our scheme does not need to change the original
framework and the infrastructure of the LTE-A network, although a ciphered IMSI is
transmitted. The authentication procedure is performed by the HSS to authenticate the UEs and
the MME; therefore, the impersonating of the MME and UEs is not possible. Our evaluation
demonstrates that the proposed scheme is secure and achieves the security requirements of the
LTE-A subscribers such as privacy, authentication, confidentiality and integrity. In our scheme,
we try to maintain the problems defined in the previous related works.
Ensuring Security in Emergency through SMS Alert SystemEditor IJCATR
Short Message Services are increasingly being relied upon to disseminate critical information during emergencies. In recent
days accident happens very common due to heavy traffic and increase in vehicle level and bad drivers, hence it requires a software to
inform the service centre for instant help to save life of the people. Sending the nearest emergency service and/or police officers
needed for reporting the accident can be quite tedious. The idea of this work is to reduce the time required by the emergency
personnel to reach the accident area. This can be done if the information about an accident reaches the emergency services in time and
accurately. The project eliminates any communication between the victim and the personnel which leads to confusion. This is done by
finding the accurate position of the location by making use of the GPS services available in cell phones when the victim sends a
message to the emergency number(such as 108). The project aims at reducing the severe loss due to injury and fatality rate in accidents
to a great extent.
Sending an image using Short Message SM is the purpose of this article. An image contains a large information and existing base character such us American Standard Code for Information Interchange ASCII are not enough for encoding, then we are obliged to create a new base. The short message will go through mobile telecom network. The sender uploads the image, the algorithm process on its turn to convert the input to short message and the receiver receives a binary photo by decoding the message received. This encoding, decoding methods are not limited for Person to Person P2P service but applicable also in case of bulk message Application to Person A2P and Person to Application P2A . The only condition required is that each user person or application knows the method of encoding and decoding. It means also that image encoded is supported by the standard protocol Short Message Peer to Peer Protocol SMPP . A simple image can be sent with one short message which is less than 160 characters however for complex image, it may be more than one short message. The research written on this paper can bypass the usage of Multimedia Messaging Service MMS because a Short Message Service Center SMSC can do its job in condition that the mobile operator has the application installed on Subscriber Identity Identification Mobile SIM card or in software provided which can be downloaded by subscriber. Rafidison Maminiaina Alphonse | Ramafiarisona Hajasoa Malalatiana "Image Encoding to Short/Text Message" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38047.pdf Paper URL : https://www.ijtsrd.com/engineering/telecommunications/38047/image-encoding-to-shorttext-message/rafidison-maminiaina-alphonse
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...IJECEIAES
Development of prototype at data security through secret messages is needed for disguising the messages sent in smartphone chatting application, WhatsApp (WA) Chat. We propose a model to disguise a plaintext message which is first encrypted by cryptosystem to change the plaintext message to ciphertext. Plaintext or plainimage entering the smartphone system is changed into encrypted text; receiver then can read the message by using similar key with the sender. The weakness of this proposal is the message random system is not planted directly in the chatting application; therefore message removing process from cryptosystem to WA application is still needed. The strength of using this model is the messages sent will not be easily re-encrypted by hacker and can be used at client computing section.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
SMS(Short Message Service)plays vital role in
day to day life. SMS used in many real world application like
Transportation Information System, private health facilities
using SMS, mobile banking, participation in elections through
SMS, in Crime Scene Investigation and many more.The major
problem facing in SMS is security ,while transferring message
like account number or password from one user to another
user it just taken as a plain text so there some type of attacks
like man in the middle attack, disclosure, replay attack takes
place and causing a huge risk. The traditional SMS service
does not provide information security like confidentiality,
integrity, authenticity. The attacker can alter SMS Information
using weak encryption algorithm like A5/1 or A5/2.The existing
protocol used for providing security in SMS is based on
asymmetric and symmetric key. To provide secure end to end
communication Easy SMS protocol is used which is completely
based on symmetric key. On applying AES algorithm it may
provide effective encryption for password. The expecting result
on using Easy SMS protocol is to reduce bandwidth
consumption and increasing the password or pass code
strength through SMS.
Seps aka a secure evolved packet system authentication and key agreement sch...csandit
In this paper, we propose a secure authentication of the Evolved Packet System Authentication
and Key Agreement (EPS-AKA) for the LTE-A network. Our scheme is proposed to solve the
problem of sending the IMSI as a clear text, and hence prevents the mobility management entity
attack. We will use public key (PK) cryptography to protect the transmitted messages, the RSA
scheme computation to compute a temporary value to the IMSI, and nonce to generate
challenge messages toward the opposite side. Our scheme does not need to change the original
framework and the infrastructure of the LTE-A network, although a ciphered IMSI is
transmitted. The authentication procedure is performed by the HSS to authenticate the UEs and
the MME; therefore, the impersonating of the MME and UEs is not possible. Our evaluation
demonstrates that the proposed scheme is secure and achieves the security requirements of the
LTE-A subscribers such as privacy, authentication, confidentiality and integrity. In our scheme,
we try to maintain the problems defined in the previous related works.
Ensuring Security in Emergency through SMS Alert SystemEditor IJCATR
Short Message Services are increasingly being relied upon to disseminate critical information during emergencies. In recent
days accident happens very common due to heavy traffic and increase in vehicle level and bad drivers, hence it requires a software to
inform the service centre for instant help to save life of the people. Sending the nearest emergency service and/or police officers
needed for reporting the accident can be quite tedious. The idea of this work is to reduce the time required by the emergency
personnel to reach the accident area. This can be done if the information about an accident reaches the emergency services in time and
accurately. The project eliminates any communication between the victim and the personnel which leads to confusion. This is done by
finding the accurate position of the location by making use of the GPS services available in cell phones when the victim sends a
message to the emergency number(such as 108). The project aims at reducing the severe loss due to injury and fatality rate in accidents
to a great extent.
Sending an image using Short Message SM is the purpose of this article. An image contains a large information and existing base character such us American Standard Code for Information Interchange ASCII are not enough for encoding, then we are obliged to create a new base. The short message will go through mobile telecom network. The sender uploads the image, the algorithm process on its turn to convert the input to short message and the receiver receives a binary photo by decoding the message received. This encoding, decoding methods are not limited for Person to Person P2P service but applicable also in case of bulk message Application to Person A2P and Person to Application P2A . The only condition required is that each user person or application knows the method of encoding and decoding. It means also that image encoded is supported by the standard protocol Short Message Peer to Peer Protocol SMPP . A simple image can be sent with one short message which is less than 160 characters however for complex image, it may be more than one short message. The research written on this paper can bypass the usage of Multimedia Messaging Service MMS because a Short Message Service Center SMSC can do its job in condition that the mobile operator has the application installed on Subscriber Identity Identification Mobile SIM card or in software provided which can be downloaded by subscriber. Rafidison Maminiaina Alphonse | Ramafiarisona Hajasoa Malalatiana "Image Encoding to Short/Text Message" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38047.pdf Paper URL : https://www.ijtsrd.com/engineering/telecommunications/38047/image-encoding-to-shorttext-message/rafidison-maminiaina-alphonse
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...IJECEIAES
Development of prototype at data security through secret messages is needed for disguising the messages sent in smartphone chatting application, WhatsApp (WA) Chat. We propose a model to disguise a plaintext message which is first encrypted by cryptosystem to change the plaintext message to ciphertext. Plaintext or plainimage entering the smartphone system is changed into encrypted text; receiver then can read the message by using similar key with the sender. The weakness of this proposal is the message random system is not planted directly in the chatting application; therefore message removing process from cryptosystem to WA application is still needed. The strength of using this model is the messages sent will not be easily re-encrypted by hacker and can be used at client computing section.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding TechniqueCSCJournals
Hyperspectral imaging is widely used in many applications; especially in vegetation, climate changes, and desert studies. Such kind of imaging has a huge amount of data, which requires transmission, processing, and storage resources especially for space borne imaging. Compression of hyperspectral data cubes is an effective solution for these problems. Lossless compression of the hyperspectral data usually results in low compression ratio, which may not meet the available resources; on the other hand, lossy compression may give the desired ratio, but with a significant degradation effect on object identification performance of the hyperspectral data. Moreover, most hyperspectral data compression techniques exploits the similarities in spectral dimensions; which requires bands reordering or regrouping, to make use of the spectral redundancy. In this paper, we analyze the spectral cross correlation between bands for Hyperion hyperspectral data; spectral cross correlation matrix is calculated, assessing the strength of the spectral matrix, and finally, we propose new technique to find highly correlated groups of bands in the hyperspectral data cube based on "inter band correlation square", from the resultant groups of bands we propose a new predictor that can predict efficiently the whole bands within data cube based on weighted combination of spectral and spatial prediction, the results are evaluated versus other state of the art predictor for lossless compression.
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
In this paper, we proposed a replacement hybrid multipath routing protocol for
MANET known as Hybrid Multipath Progressive Routing Protocol for MANET (HMPRP),
during this work we improve the performance of accepted MANET routing protocols,
namely, the Ad-hoc On-demand Distance Vector routing protocol and use of their most
popular properties to formulate a replacement Hybrid routing protocol using the received
signal strength. The proposed routing protocol optimizes the information measure usage of
MANETs by reducing the routing overload and overhead. This proposed routing protocol
additionally extends the battery lifetime of the mobile devices by reducing the specified
variety of operations for (i) Route determination (ii) for packet forwarding. Simulation
results are used to draw conclusions regarding the proposed routing algorithm and
compared it with the AODV, OLSR, and ZRP protocol. Experiments carried out based on
this proposed algorithm, shows that better performance are achieved with regard to AODV,
OLSR, and ZRP routing algorithm in terms of packet delivery ratio, throughput, energy
consumed and end-to-end packet delay.
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
Most real life networks are hybrid networks. A hybrid network combines the best features of two or more networks. In networking terminology, a hybrid network according to “Information Technology control and Audit” are reliable and versatile. They provide large numbers of connections and data transmission paths to users. These hybrid networks may be treated as network nodes for analysis purpose. The two radio access technologies (RATs) are considered with cellular/WLAN depending on whether it is voice/ data, video. For observing practical result, some setups are required in laboratory which includes interface from personal computer to mobile terminal and vice-versa. The network simulator (Ns-2) is used for analysis purpose. The results shows the parameters like energy good put, Bandwidth utilization, packet delivery ratio, energy good put and energy consumed are improved after using hybrid networks.
Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...kknsastry
A recent study Sastry and Xiao (2001) proposed a highly reliable cluster optimization algorithm which employed extended compact genetic algorithm (ECGA) along with Nelder-Mead simplex search. This study utilizes an efficiency enhancement technique for the ECGA based cluster optimizer to reduce the population size and the number of function evaluation requirements, yet retaining the high reliability of predicting the lowest energy structure. Seeding of initial population with lowest energy structures of smaller cluster has been employed as the efficiency enhancement technique. Empirical results indicate that the population size and total number of function evaluations scale up with the cluster size are reduced from O(n4.2) and O(n8.2) to O(n0.83) and O(n2.45) respectively.
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...ijsrd.com
Wireless sensor networks are widely considered as one of the most important technologies. The Wireless Sensor Network (WSN) is a wireless network consisting of ten to thousand small nodes with sensing, computing and wireless communication capabilities. They have been applied to numerous fields such as healthcare, monitoring system, military, and so forth. Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Energy efficiency is thus a primary issue in maintaining the network. Innovative techniques that improve energy efficiency to prolong the network lifetime are highly required. Clustering is an effective topology control approach in wireless sensor networks. This paper elaborates several techniques like LEACH, HEED, LEACH-B, PEACH, EEUC of cluster head selection for energy efficient in wireless sensor networks.
To analyze the efficiency of heterogeneous wireless sensor network over homogenous wireless sensor network.
To analyze the stability, life time ,through put.
A new algorithm for data compression technique using vlsiTejeswar Tej
HOW COMPRESSION IS POSSIBLE?????????
NOW A DAYS LOT OF ALGORITHMS ARE READY TO COMPRESS DATA BUT POWER IS THE MAJOR CRITERIA OF ALL.BUT MY PROJECT IS TO OVERCOME IT I..E THE NEW ALGORITHM BY
K-RLE
Analysis and Compression of Reflectance Data Using An Evolved Spectral Correl...Peter Morovic
Since spectral data is significantly higher-dimensional than colorimetric data, the choice of operating in a spectral domain brings memory, storage and computational throughput hits with it. While spectral compression techniques exist, e.g., on the basis of Multivariate Analysis (mainly Principal Component Analysis and related methods), they result in representations of spectra that no longer have a direct physical meaning in that their individual val- ues no longer directly express properties at a specific wavelength interval. As a result, such compressed spectral data is not suitable for direct application of physically meaningful computation and analysis. The framework presented here is an evolution and exten- sion of the spectral correlation profile published before. It is a simple model, driven by a few adjustable parameters, that allows for the generation of nearly arbitrary, but physically realistic, spectra that can be computed efficiently, and are useful over a wide range of conditions. A practical application of its principles then includes a spectral compression approach that relies on dis- carding spectral wavelengths that are most redundant, given cor- relation to their neighbors. The goodness of representing realistic spectra is evaluated using the MIPE metric as applied to the SOCS and other databases as a reference. The end result is an efficient, yet physically meaningful, compressed spectral representation that benefits computation, transmission and storage of spectral content.
Types of Data compression, Lossy Compression, Lossless compression and many more. How data is compressed etc. A little extensive than CIE O level Syllabus
In computer science and information theory, data compression, source coding,[1] or bit-rate reduction involves encoding information using fewer bits than the original representation.[2] Compression can be either lossy or lossless. Lossless compression reduces bits by identifying and eliminating statistical redundancy. No information is lost in lossless compression.
Performance analysis of Hybrid Transform, Hybrid Wavelet and Multi-Resolutio...IJMER
Compression of digital images play vital role in transmission of multimedia data. This paper
presents application of hybrid wavelet transform in image compression. Multi-resolution property of
Wavelet transform helps to analyze the information contents of image effectively. This property has been
used in image compression application. Hybrid wavelet transform is generated using two different
component transforms. Various sizes of these component transforms can be used. In this hybrid wavelet,
global and local properties of component transforms are incorporated and hence are called bi-resolution
analysis. Different levels of resolutions can also be included in generated hybrid transform. Hence It is
called multi-resolution analysis and is applied on images. At each level of resolution number of
components can be changed. It provides great flexibility to generate hybrid transform matrix. Image is
compressed using hybrid wavelet, hybrid wavelet with multi-resolution and hybrid transform. Their
performance is compared and it has been observed that hybrid wavelet transform gives lower error
values than multi-resolution analysis and hybrid transform. Along with Root mean Square Error (RMSE),
Mean Absolute Error (MAE) and Average Fractional Change in Pixel Value (AFCPV) is used to measure
error. AFCPV gives better perception to image quality as it is a fractional change in pixel values. Lower
the value of AFCPV better is the image quality.
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding TechniqueCSCJournals
Hyperspectral imaging is widely used in many applications; especially in vegetation, climate changes, and desert studies. Such kind of imaging has a huge amount of data, which requires transmission, processing, and storage resources especially for space borne imaging. Compression of hyperspectral data cubes is an effective solution for these problems. Lossless compression of the hyperspectral data usually results in low compression ratio, which may not meet the available resources; on the other hand, lossy compression may give the desired ratio, but with a significant degradation effect on object identification performance of the hyperspectral data. Moreover, most hyperspectral data compression techniques exploits the similarities in spectral dimensions; which requires bands reordering or regrouping, to make use of the spectral redundancy. In this paper, we analyze the spectral cross correlation between bands for Hyperion hyperspectral data; spectral cross correlation matrix is calculated, assessing the strength of the spectral matrix, and finally, we propose new technique to find highly correlated groups of bands in the hyperspectral data cube based on "inter band correlation square", from the resultant groups of bands we propose a new predictor that can predict efficiently the whole bands within data cube based on weighted combination of spectral and spatial prediction, the results are evaluated versus other state of the art predictor for lossless compression.
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
In this paper, we proposed a replacement hybrid multipath routing protocol for
MANET known as Hybrid Multipath Progressive Routing Protocol for MANET (HMPRP),
during this work we improve the performance of accepted MANET routing protocols,
namely, the Ad-hoc On-demand Distance Vector routing protocol and use of their most
popular properties to formulate a replacement Hybrid routing protocol using the received
signal strength. The proposed routing protocol optimizes the information measure usage of
MANETs by reducing the routing overload and overhead. This proposed routing protocol
additionally extends the battery lifetime of the mobile devices by reducing the specified
variety of operations for (i) Route determination (ii) for packet forwarding. Simulation
results are used to draw conclusions regarding the proposed routing algorithm and
compared it with the AODV, OLSR, and ZRP protocol. Experiments carried out based on
this proposed algorithm, shows that better performance are achieved with regard to AODV,
OLSR, and ZRP routing algorithm in terms of packet delivery ratio, throughput, energy
consumed and end-to-end packet delay.
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
Most real life networks are hybrid networks. A hybrid network combines the best features of two or more networks. In networking terminology, a hybrid network according to “Information Technology control and Audit” are reliable and versatile. They provide large numbers of connections and data transmission paths to users. These hybrid networks may be treated as network nodes for analysis purpose. The two radio access technologies (RATs) are considered with cellular/WLAN depending on whether it is voice/ data, video. For observing practical result, some setups are required in laboratory which includes interface from personal computer to mobile terminal and vice-versa. The network simulator (Ns-2) is used for analysis purpose. The results shows the parameters like energy good put, Bandwidth utilization, packet delivery ratio, energy good put and energy consumed are improved after using hybrid networks.
Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...kknsastry
A recent study Sastry and Xiao (2001) proposed a highly reliable cluster optimization algorithm which employed extended compact genetic algorithm (ECGA) along with Nelder-Mead simplex search. This study utilizes an efficiency enhancement technique for the ECGA based cluster optimizer to reduce the population size and the number of function evaluation requirements, yet retaining the high reliability of predicting the lowest energy structure. Seeding of initial population with lowest energy structures of smaller cluster has been employed as the efficiency enhancement technique. Empirical results indicate that the population size and total number of function evaluations scale up with the cluster size are reduced from O(n4.2) and O(n8.2) to O(n0.83) and O(n2.45) respectively.
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...ijsrd.com
Wireless sensor networks are widely considered as one of the most important technologies. The Wireless Sensor Network (WSN) is a wireless network consisting of ten to thousand small nodes with sensing, computing and wireless communication capabilities. They have been applied to numerous fields such as healthcare, monitoring system, military, and so forth. Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Energy efficiency is thus a primary issue in maintaining the network. Innovative techniques that improve energy efficiency to prolong the network lifetime are highly required. Clustering is an effective topology control approach in wireless sensor networks. This paper elaborates several techniques like LEACH, HEED, LEACH-B, PEACH, EEUC of cluster head selection for energy efficient in wireless sensor networks.
To analyze the efficiency of heterogeneous wireless sensor network over homogenous wireless sensor network.
To analyze the stability, life time ,through put.
A new algorithm for data compression technique using vlsiTejeswar Tej
HOW COMPRESSION IS POSSIBLE?????????
NOW A DAYS LOT OF ALGORITHMS ARE READY TO COMPRESS DATA BUT POWER IS THE MAJOR CRITERIA OF ALL.BUT MY PROJECT IS TO OVERCOME IT I..E THE NEW ALGORITHM BY
K-RLE
Analysis and Compression of Reflectance Data Using An Evolved Spectral Correl...Peter Morovic
Since spectral data is significantly higher-dimensional than colorimetric data, the choice of operating in a spectral domain brings memory, storage and computational throughput hits with it. While spectral compression techniques exist, e.g., on the basis of Multivariate Analysis (mainly Principal Component Analysis and related methods), they result in representations of spectra that no longer have a direct physical meaning in that their individual val- ues no longer directly express properties at a specific wavelength interval. As a result, such compressed spectral data is not suitable for direct application of physically meaningful computation and analysis. The framework presented here is an evolution and exten- sion of the spectral correlation profile published before. It is a simple model, driven by a few adjustable parameters, that allows for the generation of nearly arbitrary, but physically realistic, spectra that can be computed efficiently, and are useful over a wide range of conditions. A practical application of its principles then includes a spectral compression approach that relies on dis- carding spectral wavelengths that are most redundant, given cor- relation to their neighbors. The goodness of representing realistic spectra is evaluated using the MIPE metric as applied to the SOCS and other databases as a reference. The end result is an efficient, yet physically meaningful, compressed spectral representation that benefits computation, transmission and storage of spectral content.
Types of Data compression, Lossy Compression, Lossless compression and many more. How data is compressed etc. A little extensive than CIE O level Syllabus
In computer science and information theory, data compression, source coding,[1] or bit-rate reduction involves encoding information using fewer bits than the original representation.[2] Compression can be either lossy or lossless. Lossless compression reduces bits by identifying and eliminating statistical redundancy. No information is lost in lossless compression.
Performance analysis of Hybrid Transform, Hybrid Wavelet and Multi-Resolutio...IJMER
Compression of digital images play vital role in transmission of multimedia data. This paper
presents application of hybrid wavelet transform in image compression. Multi-resolution property of
Wavelet transform helps to analyze the information contents of image effectively. This property has been
used in image compression application. Hybrid wavelet transform is generated using two different
component transforms. Various sizes of these component transforms can be used. In this hybrid wavelet,
global and local properties of component transforms are incorporated and hence are called bi-resolution
analysis. Different levels of resolutions can also be included in generated hybrid transform. Hence It is
called multi-resolution analysis and is applied on images. At each level of resolution number of
components can be changed. It provides great flexibility to generate hybrid transform matrix. Image is
compressed using hybrid wavelet, hybrid wavelet with multi-resolution and hybrid transform. Their
performance is compared and it has been observed that hybrid wavelet transform gives lower error
values than multi-resolution analysis and hybrid transform. Along with Root mean Square Error (RMSE),
Mean Absolute Error (MAE) and Average Fractional Change in Pixel Value (AFCPV) is used to measure
error. AFCPV gives better perception to image quality as it is a fractional change in pixel values. Lower
the value of AFCPV better is the image quality.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The Digital Wireless Telephony comprise of two main working technologies:
GSM which stands for Global System for Mobile Communication.
CDMA which stands for Code Division Multiple Access.
Rest is explained in the slides
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...cscpconf
In this paper, we propose a secure authentication of the Evolved Packet System Authentication and Key Agreement (EPS-AKA) for the LTE-A network. Our scheme is proposed to solve the
problem of sending the IMSI as a clear text, and hence prevents the mobility management entity attack. We will use public key (PK) cryptography to protect the transmitted messages, the RSA scheme computation to compute a temporary value to the IMSI, and nonce to generate challenge messages toward the opposite side. Our scheme does not need to change the original
framework and the infrastructure of the LTE-A network, although a ciphered IMSI is transmitted. The authentication procedure is performed by the HSS to authenticate the UEs and
the MME; therefore, the impersonating of the MME and UEs is not possible. Our evaluation demonstrates that the proposed scheme is secure and achieves the security requirements of the
LTE-A subscribers such as privacy, authentication, confidentiality and integrity. In our scheme, we try to maintain the problems defined in the previous related works.
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMIJNSA Journal
In this study security of internet access over the Third Generation (3G) telecommunication systems is considered and Universal Mobile Telecommunications System (UMTS) is selected as the most popular system among 3G systems. The study then focuses on network access security mechanism of UMTS, called Authentication and Key Agreement (AKA). In addition, twenty types of important attacks and threats in UMTS system are presented and classified based on three major security factors; authentication, confidentiality, and data integrity. The evaluations finally show that the authentication factor is more interesting than other factors for hackers. Then, we describe four attacks named; man-inthe-middle, denial of service, identity catching, and redirection as the most significant attacks against authentication mechanism. Furthermore, we provide some solutions and methods to improve AKA
mechanism and prevent these attacks in UMTS system.
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...Kumar Goud
A Tracking System using Location Prediction and Dynamic Threshold for Minimising Message Delivery
Ettaboina Sharanya DR.M.Nagaratna (Ph.D)
M.Tech (Information Technology) Assistant professor, Dept of CSE
JNTUCEH, Hyderabad. JNTUCEH, Hyderabad
Abstract: Cellular text electronic messaging services area unit progressively being relied upon to broadcast crucial data throughout emergencies. Accordingly, a good vary of organizations together with faculties and universities currently partner with third-party suppliers that promise to improve physical security by apace delivering such messages. Sadly, these products don't work as publicised because of limitations of cellular infrastructure and thus give a false sense of security to their users. During this paper, we have a tendency to perform the primary extensive investigation associate degreed characterization of the restrictions of an Emergency Alert System (EAS) mistreatment text messages as a security incident response mechanism. we have a tendency to show emergency alert systems designed on text electronic messaging not solely will meet the ten minute delivery requirement mandated by the WARN Act, however conjointly doubtless cause different voice and SMS traffic to be blocked at rates upward of 80 percent. We have a tendency to then show that our results area unit representative of reality by scrutiny them to variety of documented however not previously understood failures. Finally, we have a tendency to analyze a targeted electronic messaging mechanism as a way of with efficiency mistreatment presently deployed infrastructure and third-party EAS. In thus doing, we have a tendency to demonstrate that this progressively deployed security infrastructure will not deliver the goods its expressed needs for giant populations.
Keywords: emergency alert system, sms, EAS
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Similar to Hybrid Compression Encryption Technique for Securing SMS (20)
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Hybrid Compression Encryption Technique for Securing SMS
1. Tarek M Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed & Ahmed M Mahfouz
International Journal of Computer Science and Security (IJCSS), Volume (3): Issue (6) 473
Hybrid Compression Encryption Technique for Securing SMS
Tarek M. Mahmoud Tarek@minia.edu.eg
Faculty of science/ Department
of Computer Science
Minia University
El Minia, Egypt
Bahgat A. Abdel-latef Dr_bahgat2005@yahoo.com
Faculty of science/ Department
of Computer Science
Minia University
El Minia, Egypt
Awny A. Ahmed awny_ahmed70@yahoo.com
Faculty of science/ Department
of Computer Science
Minia University
El Minia, Egypt
Ahmed M. Mahfouz AhmedMahfouz@minia.edu.eg
Faculty of science/ Department
of Computer Science
Minia University
El Minia, Egypt
Abstract
Mobile communication devices have become popular tools for gathering and
disseminating information and data. When sensitive information is exchanged
using SMS, it is crucial to protect the content from eavesdroppers as well as
ensuring that the message is sent by a legitimate sender. Using an encryption
technique to secure SMS data increases its length and accordingly the cost of
sending it. This paper provides a hybrid compression encryption technique to
secure the SMS data. The proposed technique compresses the SMS to reduce
its length, then encrypts it using RSA algorithm. A signature is added to the
encrypted SMS for signing it to differentiate it from other SMS messages in
SMSINBOX. The experimental results which are based on Symbian OS show
that the proposed technique guarantees SMS data security without increasing its
size.
Keywords: Mobile Communication Devices, Short Message Service, compression, encryption, Symbian
Operating System
2. Tarek M Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed & Ahmed M Mahfouz
International Journal of Computer Science and Security (IJCSS), Volume (3): Issue (6) 474
1. INTRODUCTION
Mobile communication devices have become commonplace during the past few years, integrating
multiple wireless networking technologies to support additional functionality and services. One of
the most important developments that have emerged from communications technology is SMS. It
was designed as part of Global System for Mobile communications (GSM), but is now available
on a wide range of network standards such as the Code Division Multiple Access (CDMA) [1].
Although SMS was originally meant to notify users of their voicemail messages, it has now
become a popular means of communication by individuals and businesses. Banks worldwide are
using SMS to conduct some of their banking services. For example, clients are able to query their
bank balances via SMS or conduct mobile payments. Also, people sometimes exchange
confidential information such as passwords or sensitive data amongst each other [2].
SMS technology suffers from some risks such as vulnerabilities, eavesdroppers and unauthorized
access [3]. So, we need to find a solution to ensure that these SMS messages are secure and
their contents remain private, without increasing their lengths.
This paper provides a solution to this SMS security problem. Our approach is to secure the SMS
message using Hybrid Compression Encryption (HCE) system. The proposed technique
compresses the SMS to reduce its length, then encrypts it using RSA algorithm. A signature is
added to the encrypted SMS for signing it to differentiate it from other SMS messages in
SMSINBOX.
This paper is structured as follows: Section 2 gives an overview of Short Message Service (SMS).
Section 3 provides some details of SMS security. The Proposed Technique used for Securing
SMS is introduced in section 4. Section 5 shows our experimental results. Finally, conclusion and
future work are presented in section 6.
2. Short Message Service (SMS)
SMS is a communication service standardized in the GSM mobile communication systems; it can
be sent and received simultaneously with GSM voice, data and fax calls. This is possible because
whereas voice, data and fax calls take over a dedicated radio channel for the duration of the call,
short messages travel over and above the radio channel using the signaling path [4]. Using
communications protocols such as Short Message Peer-to-Peer (SMPP) [5] allow the interchange
of short text messages between mobile telephone devices as shown in Figure 1 that describe
traveling of SMS between parties.
FIGURE 1: The basic of SMS system.
SMS contains some meta-data [6]:
• Information about the senders ( Service center number, sender number)
• Protocol information (Protocol identifier, Data coding scheme)
• Timestamp
3. Tarek M Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed & Ahmed M Mahfouz
International Journal of Computer Science and Security (IJCSS), Volume (3): Issue (6) 475
SMS messages do not require the mobile phone to be active and within range, as they will be
held for a number of days until the phone is active and within range. SMS are transmitted within
the same cell or to anyone with roaming capability. The SMS is a store and forward service, and
is not sent directly but delivered via an SMS Center (SMSC). SMSC is a network element in the
mobile telephone network, in which SMS is stored until the destination device becomes available.
Each mobile telephone network that supports SMS has one or more messaging centers to handle
and manage the short messages [4].
SMS message packets are simple in design. The structure of SMS packet is shown in Figure 2
[2].
FIGURE 2: SMS Message structure
An SMS comprises of the following elements, of which only the user data is displayed on the
recipient’s mobile device:
• Header - identifies the type of message:
• Instruction to Air interface
• Instruction to SMSC
• Instruction to Phone
• Instruction to SIM card
• User Data - the message body (payload).
As shown in Table 1, each SMS is up to 140 bytes, which represents the maximum size of SMS,
and each short message is up to 160 characters in length when Latin alphabets are used, where
each character is 7 bits according to the 7-bit default alphabet in Protocol Data Unit (PDU) format,
and 70 characters in length when non-Latin alphabets such as Arabic and Chinese are used,
where 16-bit messages are used [7] [8].
Text length per message
segment
Coding scheme
160 charactersGSM alphabet, 7 bits
140 octets8-bit data
4. Tarek M Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed & Ahmed M Mahfouz
International Journal of Computer Science and Security (IJCSS), Volume (3): Issue (6) 476
70 complex charactersUSC2, 16 bits
TABLE 1: Relation between coding scheme and text length.
3. SMS security
SMS travels as plain text and privacy of the SMS contents cannot be guaranteed, not only over
the air, but also when such messages are stored on the handset. The contents of SMS messages
are visible to the network operator's systems and personnel. The demand for active SMS based
services can only be satisfied when a solution that addresses end-to-end security issues of SMS
technology is available, where primary security parameters of authentication, confidentiality,
integrity and non-repudiation are satisfied [9,13].
Authentication is concerned with only specific users with specific combination of device,
application, memory card, and SIM card that are allowed to access corporate data. This way the
users or unauthorized persons cannot change any part of the combination to obtain access to
sensitive data. Confidentiality is about ensuring that only the sender and intended recipient of a
message can read its content. Integrity is concerned with ensuring that the content of the
messages and transactions not being altered, whether accidentally or maliciously. Non-
repudiation is about providing mechanisms to guarantee that a party involved in a transaction
cannot falsely claim later that he/ she did not participate in that transaction[14].
An end-to-end key based encryption technology for SMS plugs the gaps in transit security of
SMS. Authentication added for resident SMS security access together with encryption, addresses
the confidentiality issue of SMS technology. Added features of message integrity and digital
signing of SMS address integrity and Non Repudiation for SMS technology[15].
4. The Proposed Technique for Securing SMS
In this section, we describe the proposed technique used to secure SMS without increasing its
length. The two main steps of this technique are the compression and encryption processes.
SMS Compression is the process of encoding SMS information using fewer bits than an
unencoded representation. The purpose of this step in the proposed technique is reducing the
consumption of expensive resources and reducing SMS length. SMS encryption is the art of
achieving security by encoding messages to make them non-readable.
The steps of the proposed technique can be described as follows:
Step 1: Get SMS.
Step 2: Determine the SMS recipient.
Step 3: Compress the SMS.
Step 4: Check the compressed SMS length.
4.1 If it is greater than 145 characters then divide it into more than one according to its
length such that each message is 145 characters to satisfy the message length limit imposed by
the proposed technique.
Step 5: Encrypt the compressed SMS using RSA algorithm.
Step 6: Add signature to the SMS.
Step 7: Send the SMS.
In Step 4, restricting the SMS length in the proposed technique to 145 characters is necessary for
the encryption process. We have conducted many experiments to determine the length of SMS
cipher (encrypted) text. Table 2 illustrates the experimental results for the relation between the
RSA Modulus bits, maximum number of SMS plain text and length of output encrypted
characters. According to these results, we selected the RSA Modulus size to be 1248 bits as
optimal value for the proposed technique, so the output cipher text will be 156 characters and the
5. Tarek M Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed & Ahmed M Mahfouz
International Journal of Computer Science and Security (IJCSS), Volume (3): Issue (6) 477
maximum input characters will be 145. As mentioned in section 2, the standard SMS length is
160 characters.
Length of Output
Encrypted Character
Number of Input Characters
Range
RSA Modulus Size (bits)
321 – 21256
641 – 53512
1281 – 1171024
1561 – 1451248
2561 – 2452048
TABLE 2: The relation between RSA Modulus bits, maximum number of Input characters and length of
output encrypted characters
In step 5, encrypting the SMS is based on RSA algorithm [10] [11].
The steps of this algorithm can be described as follows:
Step 1: choose two large primary numbers P and Q
Step 2: calculate N=P*Q
Step 3: select the public key (i.e. the encryption key) E, such that it is not a factor of (P-1) and (Q-
1)
Step 4: Select the private key (i.e. the decryption key) D, such that the following equation is true
(D*E) mod (P-1) * (Q-1) =1
Step 5: For encryption, calculate the cipher text CT from the plain text PT as follows CT=PT^E
mod N
Step 6: Send CT as the cipher text to the receiver
Step 7: For decryption, calculate the plain text PT from the cipher text CT as follows PT=CT^D
mod N
Figure 3 illustrates the SMS format after applying the proposed technique. It contains 4
characters as a signature and 156 characters as encrypted SMS data.
FIGURE 3: SMS Format after applying the proposed technique.
5. Experimental Results
This section presents the results of evaluating the efficiency of the proposed technique that is
based on Symbian OS [12]. We consider the SMS length as a criterion to evaluate the
performance of the proposed technique. The main purpose of the proposed technique is to
secure SMS. We achieved this by compressing the SMS data to reduce its length then encrypting
it to guarantee its security.
4
Signature
156
Cipher text
6. Tarek M Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed & Ahmed M Mahfouz
International Journal of Computer Science and Security (IJCSS), Volume (3): Issue (6) 478
Table 3 shows a comparison between SMS length before and after the compression step. The
1st column contains some SMS samples, the 2nd column represents the total number of SMS
characters before the compression process, and the 3rd column contains the total number of
SMS characters after compression.
Total number of SMS
characters after
compression
Total number of
SMS characters
before
compression
SMS Sample
125160
#There are "men"
like mountains "high"
friend "honor"
comradely "warranty"
communicate with them "right
and duty
of the length of time"
forgotten "impossible".
142185
Source,
Name : ahmed Mahfouz
Password : 02034112
Card Number : 2400139
Account Number : 0111149
Operation : withdrawal
Value : 1000$
Destination,
Name : MobiTech
Account Number : 0111133
119225
Dear Sir
this data are important for you so take your precautions--
--------------------------------------------name : ahmed
Muhammad
balance : 100000
your password : 02710101
----------------------------------------------
TABLE 3: Comparison between SMS length before and after Compression
Table 4 illustrates the results obtained after applying the proposed technique. The 1st column
contains SMS samples, the 2nd column represents the total number of SMS characters before
the encryption process, the 3rd column contains SMS length after the compression process, the
4th column contains the percentage of compression phase, and the 5th column contains
message length using the proposed technique.
Message
length using
the
proposed
technique
Percentage
of
compression
phase
Length of
compressed
Message
Length
of
original
Message
Message
15622%125160
#There are "men"
like mountains "high"
friend "honor"
comradely "warranty"
communicate with them "right
and duty
of the length of time"
7. Tarek M Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed & Ahmed M Mahfouz
International Journal of Computer Science and Security (IJCSS), Volume (3): Issue (6) 479
forgotten "impossible".
15623%142185
Source,
Name : ahmed Muhamed
Password : 02034112
Card Number : 2400139
Account Number : 0111149
Operation : withdrawal
Value : 1000$
Destination,
Name : MobiTech
Account Number : 0111133
15647%119225
Dear Sir
this data are important for you so take
your precautions
----------------------------------------------
name : ahmed Muhammad
balance : 100000
your password : 02710101
----------------------------------------------
15612%145165
Your account 'Save 1' was credited with
$999.98 on
Wed 22 Nov 2006
Ref.2390809CR
Call 800800 for assistance, if required.
Thank you for SMS Banking with ABC
Bank.
15610%135150
Salary has been credited to your A/C
BAL A/C NO.
Balance in A/C xxxxx3329 as of 06 Aug
2009 is INR /908.8/.
Thank you for SMS Banking with ABC
Bank.
15611%141158
xyzBank, user test
Account Number:9820209954
Available balance in A/C xx310
On 04-Nov 2008 05:30
Is Rs. 50000
Thank you for SMS Banking with ABC
Bank
15613%144166
Peace be upon you Dear,Muhammed
Key 1 :
A2HBN - 3SJKL - 7HBN6 - OIKML -
YPL9N - OPF8V - TRDCV - 7HJ4D
Key 2 :
K8DFF - BN4KI - KSLOM - QPOCD -
AOPED -x01x33IOMN - 8GVFD
Split into two
messages
32%163241
Peace be upon you
Name : Ahmed Muhamed
Account Number : 056789034
Operation type : withdrawal
Balance : 60000
Value : 10000
Outstanding Account : 40000
8. Tarek M Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed & Ahmed M Mahfouz
International Journal of Computer Science and Security (IJCSS), Volume (3): Issue (6) 480
on 15-Aug 2009 06:45
----------------------------------------------
SMS services center.
TABLE 4: Comparison between SMS lengths using compression and the proposed technique
It is clear from Table 4 that using the proposed technique for securing SMS messages caused a
considerable reduction in their lengths equal 21% approximately on average. Also, the length of
compressed message depends on its contents. It should be noted that the last message in this
table has been split into two messages because its length is greater than 145 characters.
6. Conclusion and future work
In this paper a new hybrid technique for securing SMS is introduced. The proposed technique
combines the compression and encryption processes. The proposed technique compresses the
SMS data using a lossless algorithm. After this step the compressed SMS data is encrypted using
RSA algorithm. The advantage of this technique is achieving the protection criteria such as
confidentiality and authenticity between two communication parties and at the same time
decreasing the message lengths. The experimental results show that SMS length does not
exceed the standard SMS length using the proposed technique compared with the technique that
uses only the RSA encryption process to secure SMS. Future work is required to apply the
proposed technique to other mobile operating systems and services.
REFERENCES
1. SMS document, Nokia, (2009, June). Available:http://wiki.forum.nokia.com/index.php/SMS
2. J. Li-Chang Lo, J. Bishop and J. Eloff. "SMSSec: an end-to-end protocol for secure SMS",
Computers & Security, 27(5-6):154-167, 2007.
3. P. Traynor, W. Enck, P. McDaniel and T. La Porta. "Mitigating Attacks on Open Functionality
in SMS-Capable Cellular Networks", IEEE/ACM Transactions on In Networking, 17(1):40-53,
2009
4. GSM document, Short Message Service, (2009, July). Available:
http://www.gsmfavorites.com/documents/sms/
5. SMS peer-to-peer protocol, Wikipedia, (2009, May). Available:
http://en.wikipedia.org/wiki/Short_message_peer-to-peer_protocol
6. PDU-encode-decode, thought works, (2009, July). Available:
http://twit88.com/home/utility/sms-pdu-encode-decode
7. N. Croft and M. Olivier, "Using an approximated One Time Pad to Secure Short Messaging
Service (SMS)", In Proceedings of the Southern African Telecommunication Networks and
Applications Conference. South Africa, 2005
8. G. Le Bodic, "Mobile Messaging Technologies and Services SMS, EMS and MMS", 2nd ed.,
John Wiley & Sons Ltd, (2005).
9. SMS vulnerabilities and XMS technology, Network Security Solutions, (2009, July). Available:
http://www.mynetsec.com/files/xms_mobile/SMS_Vulnerabilities_XMS_Technology_White_P
aper.pdf
10. Atul Kahate, "Cryptography and network security", 3rd ed., Tata McGrawHill, (2003).
11. David Pointcheval, RSA Laboratories' CryptoBytes, "How to Encrypt Properly with RSA",
Volume 5, No.1, Winter/Spring 2002, pp. 9-19.
12. Symbian developer library, Symbian Software Ltd, (2006, January). Available:
https://developer.symbian.com/main/documentation/sdl/;jsessionid=D059D9E1944BD96B3F
AA3A61E42E7FD7.worker1
13. Anita & Nupur Prakash, “Performance Analysis of Mobile Security Protocols: Encryption and
Authentication”, International Journal of Security, Volume (1) : Issue (1), June 2007.
14. Bhadri Raju MSVS, Vishnu Vardhan B, Naidu G A, Pratap Reddy L & Vinaya Babu A, "A
Noval Security Model for Indic Scripts - A Case Study on Telugu", International Journal of
Computer Science and Security, (IJCSS) Volume (3) : Issue (4), August 2009.
9. Tarek M Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed & Ahmed M Mahfouz
International Journal of Computer Science and Security (IJCSS), Volume (3): Issue (6) 481
15. Jayaprakash Kar & Banshidhar Majhi, "An Efficient Password Security of Multi-Party Key
Exchange Protocol based on ECDLP", November 2009.