DC Field | Value | Language |
---|---|---|
dc.contributor.author | Solanki, Divya | - |
dc.contributor.author | Bhalodia, Tosal | - |
dc.date.accessioned | 2023-05-18T05:54:01Z | - |
dc.date.available | 2023-05-18T05:54:01Z | - |
dc.date.issued | 2021-08 | - |
dc.identifier.citation | Solanki, D. ,Bhalodia, T.(2021). Improve Data Security on Mobile Phone using Encryption Schemes. International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), 8(1), 274-281, ISSN (Online) 2581-9429, DOI: 10.48175/568 | en_US |
dc.identifier.issn | 2581-9429 | - |
dc.identifier.uri | http://10.9.150.37:8080/dspace//handle/atmiyauni/1015 | - |
dc.description | I am thankful to all those who directly or indirectly help me in accomplishing my task. Last, but not the least I am grateful thank my institute, Atmiya University for giving me this opportunity to work in the great environment. | en_US |
dc.description.abstract | : It is a methodology to process and secure data on mobile phone device. It provides the security to mobile user data using Encryption schemes. It is a concept which allows users to secure their personal data on their mobile phones without having to worry about confidentiality even if the mobile is lost. It concentrates on securing data on mobile phones by storing it in an encrypted form. The data is encrypted with using encryption schemes or encryption algorithms and the key which is given by the particular user. If user mobile device is lost then there is no issue of data loss or access by unauthenticated user because the data is in encrypted form. Here different algorithms are implemented for encryption of different type of data. Those algorithms provide more security to data with less time consumption. User can also use these algorithms for data encryption during sharing of data which they want to share with another user. So user can use these encryption algorithms for security of their data. For decryption of data there is a need for key which is given by the user at the time of encryption. This concept will make the data safe on mobile phone and provide better security during data transmission. | en_US |
dc.language.iso | en | en_US |
dc.publisher | International Journal of Advanced Research in Science, Communication and Technology (IJARSCT) | en_US |
dc.subject | Data security | en_US |
dc.subject | Encryption Scheme | en_US |
dc.subject | Encryption Algorithms | en_US |
dc.subject | Mobile Phone Security | en_US |
dc.subject | Data Encryption | en_US |
dc.subject | Mobile Encryption | en_US |
dc.title | Improve Data Security on Mobile Phone using Encryption Schemes | en_US |
dc.type | Article | en_US |
Appears in Collections: | 01. Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
1090) 72804_Divya Solanki.pdf | 388.99 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.