Corpus ID: 14916285

Securing RJSON data between Middleware and Smart phones through Java Script based Cryptographic Algorithms

@inproceedings{Singh2013SecuringRD,
  title={Securing RJSON data between Middleware and Smart phones through Java Script based Cryptographic Algorithms},
  author={Mandeep Singh and K. S. Dhindsa},
  year={2013}
}
  • Mandeep Singh, K. S. Dhindsa
  • Published 2013
  • Computer Science
  • Smartphone has become the most typical and popular mobile device in recent years. It combines the functionality of mobile phone and PDA. Besides, it provides many computers' functionality, Middleware as processing, communication, data storage and etc. It also provides many computers' service, such as web browser, portable media player, video call, GPS, Wi-Fi and etc. This paper provides an effective mechanism for securing the communication between the RJSON data from the middleware and back… CONTINUE READING
    2 Citations
    A review on enhancing storage space of smartphone using virtualization
    • S. B. Olaleye, Ishan Ranjan
    • Computer Science
    • 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE)
    • 2015
    • 1

    References

    SHOWING 1-10 OF 18 REFERENCES
    Evaluation of symmetric encryption algorithms for MANETs
    • 33
    The Design and Implementation of Passwords Management System Based on Blowfish Cryptographic Algorithm
    • Mingyan Wang, Y. Que
    • Computer Science
    • 2009 International Forum on Computer Science-Technology and Applications
    • 2009
    • 13
    Cryptography and Network Security: Principles and Practice
    • 4,875
    • PDF
    Performance Evaluation of DES and Blowfish Algorithms
    • T. Nie, C. Song, Xulong Zhi
    • Computer Science
    • 2010 International Conference on Biomedical Engineering and Computer Science
    • 2010
    • 59
    A High Throughput Algorithm for Data Encryption
    • 4
    COMPARISON OF DATA ENCRYPTION ALGORITHMS
    • 131
    • PDF
    A survey of platforms for mobile networks research
    • 81
    • PDF