Proposing a security system for the VPN through design and implementation of a scheme for android and IOS mobiles based on two-factor authentication

AAM Lehmoud, NT Obeis, AF Mutar - Periodicals of Engineering …, 2022 - pen.ius.edu.ba
A virtual private network (VPN) is a network, but a virtual network means that it creates a
virtual bridge between the user and the server located somewhere across the world, and this …

[PDF][PDF] Android Application For Secure File Transferring Using Data Encryption Standard

D Hadapad, RN Steven - International Journal of Engineering …, 2013 - academia.edu
Android shook the world of smartphones. Which is created full of opportunity to embrace and
make use of opportunity offered by the smartphones and this credit goes to the open model …

[PDF][PDF] Implementation of Secure Authentication Scheme for Mobile Device

P Jadhao, L Dole - International Journal of Emerging Science and …, 2013 - Citeseer
Authentication is a fundamental aspect of system security. It confirms the identity of any user
trying to log on to a domain or access network resources. Due to the numerous advantages …

[PDF][PDF] Remote access to PC using Android phone

S Bidya, N Sonawane, N Shegokar… - International Journal of …, 2014 - academia.edu
By using an application of Android mobile user can access his own or any other PC. It is a
JAVA application for PC and Android application for mobile. With the help of this both …

RatHole: Authentication Algorithm for Controling Access to Mobile Phone File Management System

MS Kabir, OM Olanrewaju… - Journal of Basics and …, 2024 - jobasr.fudutsinma.edu.ng
Millions of Naira are being laundered by criminals through internet fraud, which deceives the
victim with a false presentation, or hacking, which involves breaking information system …

[PDF][PDF] Design and Implementation of monitoring LAN user wirelessly by Android mobile based on client/server mode

RB Rathod, PR Shinde, BM Shinde… - The International Journal …, 2015 - academia.edu
--------------------------------------------------------ABSTRACT------------------------------------------------------
-----Now days various applications uses the Android phones. We can use android phone for …

Design and implementation of Android VPN client based on GMSSL

T Zhang, B Gong - International Conference on Computer …, 2022 - spiedigitallibrary.org
With the rapid development of mobile Internet, mobile terminals based on Android system
are more and more widely used in industrial production and mobile office. One of the …

[PDF][PDF] Secure VPN server deployed on raspberry pi

PK Bist, AS Mekade, AM Nair, M Chatterjee - PCE JCE_, 2017 - pce.ac.in
Abstract​—​ With the increase in data accumulation, manipulation and the need for remote
access, there is also a need for a secure network route or protocol through which users can …

[PDF][PDF] Internet Banking Two Factor Authentication Using Smartphone

PY Pawar, S Acharya, A Polawar… - International Journal of …, 2013 - academia.edu
In our project security and authentication plays a major role. It can be mainly used in online
banking. The mobile phone acts as a security token for authentication. The user login's the …

[引用][C] Secure Mobile Payment Protocol using Asymmetric Encryption for Authorization,”

S Elfakharany, AF Amin, M Zaki - Journal of Network Communications and Emerging …, 2015