Mohd Dani | Management and science university,Malaysia (original) (raw)
Uploads
Papers by Mohd Dani
GSM is most widely used cellular standard in the world. Mobile network is the shared media and an... more GSM is most widely used cellular standard in the world. Mobile network is the shared media and any user of the media can intercept the network. When the media are shared, any one can listen to or transmit on the media. Thus communication is no longer private. When media are shared, privacy and authentication are lost unless some method is established to regain it. Cryptography provides the mean to regain control over privacy and authentication. A5/x are the encryption algorithms used in order to ensure privacy of conversations on GSM mobile phones. A5/x algorithms to secure the information sent over the air interface. The strong version A5/1 is used in most countries. A5/2 is weaker version used in countries on which export restrictions apply. A5/3 encryption algorithm used for GSM and ECSD and GEA3 encryption algorithm for GPRS. The following paper is based on simulation of A5/1 and A5/3 algorithms.
There have been a number of experimental and quasi-experimental studies that have demonstrated th... more There have been a number of experimental and quasi-experimental studies that have demonstrated the effectiveness of ER and to provide support for the use of ER in English as a second language (ESL) and EFL classroom settings. The purpose of this short article is to provide an overview of the studies which can help teachers become familiar with both the benefits and the research.
GSM is most widely used cellular standard in the world. Mobile network is the shared media and an... more GSM is most widely used cellular standard in the world. Mobile network is the shared media and any user of the media can intercept the network. When the media are shared, any one can listen to or transmit on the media. Thus communication is no longer private. When media are shared, privacy and authentication are lost unless some method is established to regain it. Cryptography provides the mean to regain control over privacy and authentication. A5/x are the encryption algorithms used in order to ensure privacy of conversations on GSM mobile phones. A5/x algorithms to secure the information sent over the air interface. The strong version A5/1 is used in most countries. A5/2 is weaker version used in countries on which export restrictions apply. A5/3 encryption algorithm used for GSM and ECSD and GEA3 encryption algorithm for GPRS. The following paper is based on simulation of A5/1 and A5/3 algorithms.
There have been a number of experimental and quasi-experimental studies that have demonstrated th... more There have been a number of experimental and quasi-experimental studies that have demonstrated the effectiveness of ER and to provide support for the use of ER in English as a second language (ESL) and EFL classroom settings. The purpose of this short article is to provide an overview of the studies which can help teachers become familiar with both the benefits and the research.