Mobile technology generations and cryptographic algorithms: analysis study

Nowadays, Mobile wireless technologies are becoming more significant and growing rapidly for better features and services. Latest Mobile technologies are expected to provide higher processing power, support high quality multimedia applications, offer reliable wireless connections, faster data tr...

Full description

Bibliographic Details
Main Authors: Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha
Format: Conference or Workshop Item
Language:English
English
Published: The Institute of Electrical and Electronics Engineers, Inc. 2016
Subjects:
Online Access:http://irep.iium.edu.my/50971/
http://irep.iium.edu.my/50971/
http://irep.iium.edu.my/50971/
http://irep.iium.edu.my/50971/1/50971_mobile_technology.pdf
http://irep.iium.edu.my/50971/4/50971_Mobile%20technology%20generations%20and%20cryptographic_Scopus.pdf
id iium-50971
recordtype eprints
spelling iium-509712017-10-12T03:39:03Z http://irep.iium.edu.my/50971/ Mobile technology generations and cryptographic algorithms: analysis study Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha QA75 Electronic computers. Computer science Nowadays, Mobile wireless technologies are becoming more significant and growing rapidly for better features and services. Latest Mobile technologies are expected to provide higher processing power, support high quality multimedia applications, offer reliable wireless connections, faster data transmission rates, and consume less power. At the same time, various mobile generations are susceptible to attack via eavesdropping and information leaking operations. Therefore, some cryptographic algorithms have proposed as confidentiality and integrity algorithms in different mobile generations, in order to prevent or mitigate these harmful operations. This paper provides analysis study of Mobile generations (From Mobile 1G to Mobile 4G) and cryptographic algorithms used in these generations. The study based on some factors like features, services, standards, and techniques which have adopted in these generations. The Institute of Electrical and Electronics Engineers, Inc. 2016 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/50971/1/50971_mobile_technology.pdf application/pdf en http://irep.iium.edu.my/50971/4/50971_Mobile%20technology%20generations%20and%20cryptographic_Scopus.pdf Jassim, Khalid Fadhil and Alshaikhli, Imad Fakhri Taha (2016) Mobile technology generations and cryptographic algorithms: analysis study. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), 8th-10th Dec. 2015, Kuala Lumpur. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7478718&filter%3DAND%28p_IS_Number%3A7478698%29 10.1109/ACSAT.2015.26
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Jassim, Khalid Fadhil
Alshaikhli, Imad Fakhri Taha
Mobile technology generations and cryptographic algorithms: analysis study
description Nowadays, Mobile wireless technologies are becoming more significant and growing rapidly for better features and services. Latest Mobile technologies are expected to provide higher processing power, support high quality multimedia applications, offer reliable wireless connections, faster data transmission rates, and consume less power. At the same time, various mobile generations are susceptible to attack via eavesdropping and information leaking operations. Therefore, some cryptographic algorithms have proposed as confidentiality and integrity algorithms in different mobile generations, in order to prevent or mitigate these harmful operations. This paper provides analysis study of Mobile generations (From Mobile 1G to Mobile 4G) and cryptographic algorithms used in these generations. The study based on some factors like features, services, standards, and techniques which have adopted in these generations.
format Conference or Workshop Item
author Jassim, Khalid Fadhil
Alshaikhli, Imad Fakhri Taha
author_facet Jassim, Khalid Fadhil
Alshaikhli, Imad Fakhri Taha
author_sort Jassim, Khalid Fadhil
title Mobile technology generations and cryptographic algorithms: analysis study
title_short Mobile technology generations and cryptographic algorithms: analysis study
title_full Mobile technology generations and cryptographic algorithms: analysis study
title_fullStr Mobile technology generations and cryptographic algorithms: analysis study
title_full_unstemmed Mobile technology generations and cryptographic algorithms: analysis study
title_sort mobile technology generations and cryptographic algorithms: analysis study
publisher The Institute of Electrical and Electronics Engineers, Inc.
publishDate 2016
url http://irep.iium.edu.my/50971/
http://irep.iium.edu.my/50971/
http://irep.iium.edu.my/50971/
http://irep.iium.edu.my/50971/1/50971_mobile_technology.pdf
http://irep.iium.edu.my/50971/4/50971_Mobile%20technology%20generations%20and%20cryptographic_Scopus.pdf
first_indexed 2023-09-18T21:12:08Z
last_indexed 2023-09-18T21:12:08Z
_version_ 1777411323181662208