[PDF][PDF] A new data encryption algorithm based on the location of mobile users

HC Liao, YH Chao - Information Technology Journal, 2008 - cyut.edu.tw
The wide spread of WLAN and the popularity of mobile devices increases the frequency of
data transmission among mobile users. However, most of the data encryption technology is …

Enhancing security and confidentiality in location-based data encryption algorithms

R Karimi, M Kalantari - … on the Applications of Digital Information …, 2011 - ieeexplore.ieee.org
With rapid growing of mobile networks and devices we can use them to send email, mobile
commerce, theatre booking, etc. In such scenario, we need to Secure Communication …

Enhancing security and confidentiality on mobile devices by location-based data encryption

R Karimi, M Kalantari - 2011 17th IEEE international conference …, 2011 - ieeexplore.ieee.org
As a result of the fast development in mobile networks and rapid growing of electronic
technology, mobile devices can be used for various purposes. Nowadays these devices not …

[PDF][PDF] Data encryption using the dynamic location and speed of mobile node

H Hamad, S Elkourd - Journal of Media and Communication …, 2010 - academicjournals.org
Due to the fast development in electronic technology, some mobile devices are designed for
new services in important applications in life. In this paper, we propose a new method of …

Adaptive and dynamic mobile phone data encryption method

C Wanpeng, B Wei - China Communications, 2014 - ieeexplore.ieee.org
To enhance the security of user data in the clouds, we present an adaptive and dynamic
data encryption method to encrypt user data in the mobile phone before it is uploaded …

[PDF][PDF] Geo-encryption to access the data using AES algorithm

H Pant, V Kaushik, V Priyanshi Singhal - Int J Eng Appl Sci Technol, 2016 - ijeast.com
The location based encryption or Geo-Encryption technique that uses GPS technology to
enhance the data security. This concept is developed so that at a particular position and …

[PDF][PDF] A Location Dependent Cryptographic Approach Based on Target Coordinate & Distance Tolerant Key transfer for GPS mobile Receiver

S Mitra, A Chakrabotry, A Bhaumik, J Devanjee… - IOSR-JCe, e-ISSN - academia.edu
Independent location based cryptography technique ensures that after transferring
encrypted data from sending end, decryption can takes place at anywhere from receiving …

[PDF][PDF] Location dependent cryptographic algorithm based on open source application

M Sen, S Tibrewal, S Majumder… - … Journal of Computer …, 2017 - researchgate.net
ABSTRACT The use of Location Based Services has helped in enhancing information
security to a great extent but there's no denial that there are flaws in its applications …

Performance Evaluation of a Hybrid Cryptosystem with Authentication for Wireless Ad hoc Networks

Y Ren, A Boukerche, RWN Pazzi - 2010 IEEE Global …, 2010 - ieeexplore.ieee.org
Though wireless networks provide great convenience to mobile users, they also give rise to
non-trivial concerns about the security due to open channels and flexible mobility. An …

An effective efficiency analysis of random key cryptography over RSA

S Beniwal - … 2nd International Conference on Computing for …, 2015 - ieeexplore.ieee.org
The cryptographic mechanism basically secure the data while performing the information
distribution in an open environment. According to type of data, application or the user …