Mobile technology generations and cryptographic algorithms: analysis study
Nowadays, Mobile wireless technologies are becoming more significant and growing rapidly for better features and services. Latest Mobile technologies are expected to provide higher processing power, support high quality multimedia applications, offer reliable wireless connections, faster data tr...
Main Authors: | Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
The Institute of Electrical and Electronics Engineers, Inc.
2016
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/50971/ http://irep.iium.edu.my/50971/ http://irep.iium.edu.my/50971/ http://irep.iium.edu.my/50971/1/50971_mobile_technology.pdf http://irep.iium.edu.my/50971/4/50971_Mobile%20technology%20generations%20and%20cryptographic_Scopus.pdf |
Similar Items
-
Analysis of confidentiality algorithms in different mobile generations
by: Jassim, Khalid Fadhil, et al.
Published: (2017) -
Comparative study on 4G/LTE cryptographic algorithms based on different factors
by: Ghanim, Alyaa, et al.
Published: (2014) -
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013) -
Comparative study of some symmetric ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2014) -
Analysis the components of SNOW 3G and ZUC ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2018)