Chaudhai “An Approach for SMS Security using Authentication Functions (original) (raw)

An Approach for SMS Security using Authentication Functions

Neetesh Saxena

IJCA, Published by Foundation of Computer Science, New York, USA, 2012

View PDFchevron_right

An Extended Approach for SMS Security using Authentication Functions

Neetesh Saxena

2012

View PDFchevron_right

Analysis of El-Gamal with Diffie-Hellman Scheme using Hash-Function for Message Security

Neetesh Saxena

Student Conference on Engineering and Systems (SCES 2012) Allahabad India, 2012

View PDFchevron_right

A Survey on Secure SMS Transmission and authentication at user end

PRAGATI PATIL

2015

View PDFchevron_right

Authentication Key-Exchange Using SMS for Web-Based Platforms

Benedicto Balilo Jr.

Journal of Computer and Communications, 2021

View PDFchevron_right

MSC : Mobile Secure Communication Using SMS in Network Security : A Survey

Sarika Jankar Deokate, rekha sarawade

View PDFchevron_right

Integration of Deffie Hellman Key Exchange Encryption and Advanced Encryption Standard Algorithm for Securing SMS based One-time Password from Man in the Middle (MITM) Attacks

Aboho Moses

View PDFchevron_right

A security mechanism for secure SMS communication

Hulisani Ratshinanga

Proceedings of SAICSIT, 2004

View PDFchevron_right

Secure SMS : Advanced Version of Cyber SMS

Abhishek Agwekar

2017

View PDFchevron_right

ECUREDSMS: A PROTOCOL FOR SMS SECURITY

IAEME Publication

IAEME PUBLICATION, 2014

View PDFchevron_right

Enhancing the Security for End to End SMS in GSM or UMTS Networks

IJAERS Journal

View PDFchevron_right

SMS SECURITY SYSTEM USING ENCRYPTION TECHNIQUES

IJCSMC Journal

IJCSMC, 2019

View PDFchevron_right

Development of Cryptography-Based Secure Messaging System

Md. Mijanur Rahman

Journal of Telecommunications System & Management, 2016

View PDFchevron_right

Advancing the Cryptographic Hash-Based Message Authentication Code

Ashish Avasthi

International Journal of Engineering and Technology, 2011

View PDFchevron_right

Enhancing Security System of Short Message Service for Banking Transaction

I Made S Raharja

International Journal of Computing, 2021

View PDFchevron_right

A Novel Password Protected Key Exchange Protocol

Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV

View PDFchevron_right

A Secure Protocol For End To End Security To SMS Banking

IRJET Journal

View PDFchevron_right

Authenticated and Secure End-To-End Communication Channel Using SMS Messages

Mahdi Stoni

AL-Rafidain Journal of Computer Sciences and Mathematics, 2009

View PDFchevron_right

A Study on Diffie-Hellman Key Exchange Protocols

M R Mishra

International Journal of Pure and Apllied Mathematics, 2017

View PDFchevron_right

New Approch For Wireless Communication Security Protocol By Using Mutual Authentication

Tumpa Roy

Advanced Computing: An International Journal, 2012

View PDFchevron_right

Enhancing Security System of Short Message Service for M-Commerce in GSM

Ashish Payal, Neetesh Saxena

IJCSET, 2011

View PDFchevron_right

Computing and Information Systems]: Security and Protection – Authentication

Hulisani Ratshinanga

2008

View PDFchevron_right

SMS Security in Mobile Devices: A Survey

Waseem Khan

View PDFchevron_right

Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications using Applied Cryptography

GRD JOURNALS, nareen kumar

View PDFchevron_right

A Secure Approach for SMS in GSM Network

Neetesh Saxena

2012

View PDFchevron_right

Ijesrt International Journal of Engineering Sciences & Research Technology End to End Transmission of SMS Using Cryptography Technique

Saurabh CHAUDHARI

2015

View PDFchevron_right

Security analysis of SMS and related technologies

Aniket Chaudhari

2015

View PDFchevron_right

A Review Based Study of Key Exchange Algorithms

Mukesh Kumar

View PDFchevron_right

Secure SMS Mobile Transaction with Peer to Peer Authentication Design for Mobile Government

American journal of Engineering Research (AJER)

View PDFchevron_right

Security Assurance Framework for SMS Using Cascaded Encryption Algorithm

Gerald Cayabyab

2015

View PDFchevron_right