scispace - formally typeset
Search or ask a question

Answers from top 8 papers

More filters
Papers (8)Insight
In the similar vein, we propose outsourced encryption and decryption mechanism for mobiles that further utilize encryption and decryption service providers for complex operations.
The novel scheme is fast, secure, has low resource consumption and is suitable for wireless sensor network node encryption schemes.
Proceedings ArticleDOI
En Wang, Yongjian Yang, Jie Wu 
05 Oct 2015
5 Citations
In this paper, it is proposed that the WiFi hotspot mode of a mobile phone is applied in the PSN, in order to realize the phone-to-phone communications.
Different from traditional single-hop wireless networks, the mobile hotspot can adopt a two-hop relay for wireless access.
The results demonstrated that the cost of implementing these encryption algorithms in smartphones is high.
Open accessProceedings ArticleDOI
Erich Dondyk, Cliff C. Zou 
28 Mar 2013
14 Citations
We demonstrate that most popular smartphones, including iPhone and Android phones, are vulnerable to denial-of-convenience attacks.
Simulation results demonstrate the effectiveness of the proposed encryption method.
Passpoints) shows that hotspot problem can be eliminated if a small increase in password entrance and confirmation times is tolerable.

Related Questions

How does encryption make eavesdropping easier?3 answersEncryption does not make eavesdropping easier. In fact, encryption is used to protect transmitted data and make it difficult for eavesdroppers to access the information. Encryption strategies can be designed to impair the eavesdropper's estimation performance and increase their estimation error covariance. Additionally, encryption can prevent an eavesdropper from determining the encryption key and obtaining the content of encrypted blocks by securely transferring information through random ordering and random block sizing. Opportunistic encryption schemes can also be implemented to create encrypted tunnels between nodes without relying on global Trusted Third Parties, providing a robust and easily deployable encryption service. Encryption systems, such as those using AES encoding algorithms, can be used to secure internet telephone systems and prevent eavesdropping during communication.
Encrypting ?4 answersAn encrypting method is a process of converting plain text into cipher text using a secret key or parameter, and transmitting it to a database. In the field of cryptography, encryption is used to obscure information for secrecy and confidentiality in communications. It can also be used for authentication, digital signatures, and digital cash. One paper discusses an encrypting device that ensures the confidentiality of emails transmitted from an Internet facsimile machine (IFAX) without additional components or construction. Another paper proposes an encrypting method that improves data dispersion without increasing the mounting size of a common key block encryption system. Additionally, an encrypting apparatus and method are described that improve the reliability of the encrypting function by producing a parameter specific to a solid-state imaging element and using it to encrypt authentication information.
How can I make my Iphone Internet connection better?9 answers
How do I change my social security settings on my Iphone?6 answers
How do I make my Iphone Internet Unprivate?10 answers
How do I turn off encryption on my SD card?7 answers