Systems and methods for preventing session hijacking

I Sokolov, K Jiang - US Patent 10,148,631, 2018 - Google Patents
The disclosed computer-implemented method for preventing session hijacking may include
(1) determining that a user is attempting to complete at least a portion of an authentication …

[PDF][PDF] SMS security in mobile devices: a survey

MW Khan - International Journal of Advanced Networking and …, 2013 - academia.edu
-------------------------------------------------------------------ABSTRACT-------------------------------------------
-------------------The Short Message Service (SMS) is one of the frequently used mobile …

Securely Compressed Extensive Text Messages: The Interactive Mobile Learning for Distance Education in the COVID–19 Pandemic

HK Premadasa - Asian Journal of Research in …, 2023 - research.send4journal.com
The COVID-19 pandemic has made a massive impact on the higher education system in the
present globe. Universities had to close abruptly due to keeping up social distancing to …

[PDF][PDF] An overview of real time secure SMS transmission

SD Rautkar, DPS Prasad - … of Advanced Research in Computer and …, 2015 - academia.edu
There are so much daily routine application where the SMS is being used including medical
purpose, banking purpose and any other mobile purpose. Forwarding an SMS is one of the …

Extensive compression of text messages in interactive mobile communication

HKS Premadasa, RGN Meegama - … Conference on Advances …, 2013 - ieeexplore.ieee.org
An extensive text message increases the message payload size causing a standard text
message to be stripped into several concatenated message. Sending such concatenated …

Design and implementation of real time secure SMS transmission

SD Rautkar, PS Prasad - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
The SMS can be used in various types of diurnal application including medical aspiration,
banking aspiration and any other mobile aspiration. Serving an SMS is one of the …

[引用][C] Secure SMS communication in android based system with two stage protection

S Banerjee, U Roy - Int. J. Comput. Sci. Mob. Comput, 2015