Mobile technology generations and cryptographic algorithms: analysis study
Nowadays, Mobile wireless technologies are becoming more significant and growing rapidly for better features and services. Latest Mobile technologies are expected to provide higher processing power, support high quality multimedia applications, offer reliable wireless connections, faster data tr...
Main Authors: | , |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
The Institute of Electrical and Electronics Engineers, Inc.
2016
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/50971/ http://irep.iium.edu.my/50971/ http://irep.iium.edu.my/50971/ http://irep.iium.edu.my/50971/1/50971_mobile_technology.pdf http://irep.iium.edu.my/50971/4/50971_Mobile%20technology%20generations%20and%20cryptographic_Scopus.pdf |
id |
iium-50971 |
---|---|
recordtype |
eprints |
spelling |
iium-509712017-10-12T03:39:03Z http://irep.iium.edu.my/50971/ Mobile technology generations and cryptographic algorithms: analysis study Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha QA75 Electronic computers. Computer science Nowadays, Mobile wireless technologies are becoming more significant and growing rapidly for better features and services. Latest Mobile technologies are expected to provide higher processing power, support high quality multimedia applications, offer reliable wireless connections, faster data transmission rates, and consume less power. At the same time, various mobile generations are susceptible to attack via eavesdropping and information leaking operations. Therefore, some cryptographic algorithms have proposed as confidentiality and integrity algorithms in different mobile generations, in order to prevent or mitigate these harmful operations. This paper provides analysis study of Mobile generations (From Mobile 1G to Mobile 4G) and cryptographic algorithms used in these generations. The study based on some factors like features, services, standards, and techniques which have adopted in these generations. The Institute of Electrical and Electronics Engineers, Inc. 2016 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/50971/1/50971_mobile_technology.pdf application/pdf en http://irep.iium.edu.my/50971/4/50971_Mobile%20technology%20generations%20and%20cryptographic_Scopus.pdf Jassim, Khalid Fadhil and Alshaikhli, Imad Fakhri Taha (2016) Mobile technology generations and cryptographic algorithms: analysis study. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), 8th-10th Dec. 2015, Kuala Lumpur. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7478718&filter%3DAND%28p_IS_Number%3A7478698%29 10.1109/ACSAT.2015.26 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha Mobile technology generations and cryptographic algorithms: analysis study |
description |
Nowadays, Mobile wireless technologies are becoming more significant and growing rapidly for better
features and services. Latest Mobile technologies are expected to provide higher processing power, support high
quality multimedia applications, offer reliable wireless connections, faster data transmission rates, and
consume less power. At the same time, various mobile generations are susceptible to attack via eavesdropping
and information leaking operations. Therefore, some cryptographic algorithms have proposed as confidentiality
and integrity algorithms in different mobile generations, in order to prevent or mitigate these harmful
operations. This paper provides analysis study of Mobile generations (From Mobile 1G to Mobile 4G) and
cryptographic algorithms used in these generations. The study based on some factors like features, services,
standards, and techniques which have adopted in these generations. |
format |
Conference or Workshop Item |
author |
Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha |
author_facet |
Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha |
author_sort |
Jassim, Khalid Fadhil |
title |
Mobile technology generations and cryptographic algorithms: analysis study |
title_short |
Mobile technology generations and cryptographic algorithms: analysis study |
title_full |
Mobile technology generations and cryptographic algorithms: analysis study |
title_fullStr |
Mobile technology generations and cryptographic algorithms: analysis study |
title_full_unstemmed |
Mobile technology generations and cryptographic algorithms: analysis study |
title_sort |
mobile technology generations and cryptographic algorithms: analysis study |
publisher |
The Institute of Electrical and Electronics Engineers, Inc. |
publishDate |
2016 |
url |
http://irep.iium.edu.my/50971/ http://irep.iium.edu.my/50971/ http://irep.iium.edu.my/50971/ http://irep.iium.edu.my/50971/1/50971_mobile_technology.pdf http://irep.iium.edu.my/50971/4/50971_Mobile%20technology%20generations%20and%20cryptographic_Scopus.pdf |
first_indexed |
2023-09-18T21:12:08Z |
last_indexed |
2023-09-18T21:12:08Z |
_version_ |
1777411323181662208 |